Saturday, October 3, 2009

Types of Cybercrime

Hi frenz lets we have a knowledge on types of cybercrime. As a cyberlaw student we should have a knowledge on it.

Types of Cybercrime
• HACKING
• DENIAL OF SERVICE
ATTACK
• VIRUS DISSEMINATION
• SOFTWARE PIRACY
• PORNOGRAPHY
• IRC Crime
• CREDIT CARD FRAUD
• PHISHING
• SPOOFING
• CYBER STALKING
• CYBER
DEFAMATION
• THREATENING
• SALAMI ATTACK
• NET EXTORTION

HACKING
The act of gaining unauthorized access to a computer system or network and in some cases making unauthorized use of this access. Hacking is also the act by which other forms of cyber-crime (e.g., fraud, terrorism, etc.) are committed. Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.

DENIAL OF SERVICE ATTACK
This is an act by the criminal, who floods the band width of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.

VIRUS DISSEMINATION
Malicious software that attaches iitself to other software.
(virus, worms, Trojan Horse, Time bomb,Logic Bomb, Rabbit and Bacterium are the malicious soft wares)

SOFTWARE PIRACY
Theft of software through the iillegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Retail revenue losses world wide are ever increasing due to this crime
Can be done in various ways such as end user copying, hard disk loading, Counterfeiting, Illegal downloads from the iinternet etc.

PRONOGRAPHY
Pornography is the first consistently successful ecommerce product. It was a
deceptive marketing tactics and mouse trapping technologies. Pronography encourage customers to access their websites. Anybody including children can log on to the internet and access website with pronography contents with a click of a mouse.

IRC CRIME
Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other Criminals use it for meeting coconspirators. Hackers use it for discussing their exploits / sharing the techniques
Paedophiles use chat rooms to allure small children.

CREDIT CARD FRAUD
You siimply have to type credit card number into www page off the vendor for
online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.

NET EXTORTION
Copying the company’s confidential data in order to extort said company for huge amount.

PHISHING
It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means.

Spoofiing
Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges ,, so as to obtain access to the other computers on the network.

CYBER STALKING
The Criminal follows the victim by sending emails, entering the chat rooms frequently.

CYBER DEFAMATION
The Criminal sends emails containing defamatory matters to all concerned of the victim or post the defamatory matters on a website. (disgruntled employee may do this against boss, ex-boys friend against girl, divorced husband against wife etc)

THREATENING
The Criminal sends threatening email or comes in contact in chat rooms with
victim. (Any one disgruntled may do this against boss, friend or official)

SALAMI ATTACK
In such crime criminal makes insignificant changes in such a manner that such changes
would go unnoticed. Criminal makes such program that deducts small amount like 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.

http//cybercelimumbai.com/files
posted by Renuka a/p Jeyabalan

21 comments:

  1. hye..thanks renu..good info bout cyber crimes...now only i know tat got alot of cyber crimes tat happening around us..:)

    ReplyDelete
  2. This comment has been removed by the author.

    ReplyDelete
  3. fuhyooo...there are lots of cyber crimes in the list, we really need to be careful...

    ReplyDelete
  4. Yes Hidayat we should be aware of this kind of cyber crime to make sure that we do not fall victim on it.

    ReplyDelete
  5. the crimes have interesting and sometimes funny names. :)

    ReplyDelete
  6. yeah, nn!
    i'm sure u meant "salami attack" when u said tat. :P

    ReplyDelete
  7. Oh my god! Cyber crimes are really hectic....

    ReplyDelete
  8. thank you so much.... the data helped me a lot in my law project! thanks again.

    ReplyDelete
  9. Nice, it simple and clear
    So do you mind if I use some in my assignments?

    ReplyDelete
  10. thank you. this really helped me in my thesis.

    ReplyDelete
  11. This comment has been removed by the author.

    ReplyDelete
  12. avoid using unsecure computers guys

    ReplyDelete
  13. thanks a lot about that..this indirectly helped me to do my work =]

    ReplyDelete
  14. i have a doubt , if some one sends abussive sms to sum1 would it also cum under cyber crime ??

    ReplyDelete
  15. thank u renuka di for dis awesome info its really very helpful for me too making ma presentation :)

    ReplyDelete
  16. pliz do help me know strategies that may be employed to prevent and control these cyber crimes

    ReplyDelete
    Replies
    1. my email please is neshbundi@yahoo.com or neshbundi1@gmail.com

      Delete
  17. hey i want a report in problem in cyber crime investigation if u have.. plz help me my mail id is agrawal.arpita.1910@gmail.com

    ReplyDelete
  18. tks very much . its really gonna help me n my cyber law exam today . wish me luck :)

    ReplyDelete