Sunteți pe pagina 1din 3

CYBER SECURITY and CYBER CRIME

includes anything from downloading illegal music files to stealing millions of


ybercrime is criminal activity done using computers and the Internet. This

C dollars from online bank accounts. Cybercrime also includes non-monetary


offenses, such as creating and distributing viruses on other computers or posting
confidential business information on the Internet.
Types of Cybercrimes
1. Hacking- a hacker is someone who seeks and exploits weaknesses in a computer
or computer network
• A white hat hacker breaks security for non-malicious reasons, perhaps to
test their own security system or while working for a security company,
which makes security software. The term "white hat" in Internet slang refers
to an ethical hacker.
• A "black hat" hacker is a hacker who "violates computer security for little
reason beyond maliciousness or for personal gain"
2. Child pornography- The Internet is being highly used by its abusers to reach and
abuse children sexually, worldwide. The easy access to the pornographic contents
readily and freely available over the Internet lowers the inhibitions of the children.
3. Cyber stalking- Cyber Stalking can be defined as the repeated acts harassment
or threatening behavior of the cyber criminal towards the victim by using Internet
services. The Stalkers have desire to control the victim’s life. Majority of the
stalkers are the dejected lovers or ex-lovers, who then want to harass the victim
because they failed to satisfy their secret desires. Most of the stalkers are men and
victim female.
4. Denial of service attack- This is an act by the criminal, who floods the bandwidth
of the victims network or fills his e-mail box with spam mail depriving him of the
services he is entitled to access or provide. Denial of Service attack is a type of
attack on a network that is designed to bring the network to its knees by flooding it
with useless traffic.
5. Virus dissemination- malicious software that attaches itself to other software.
(Virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are
the malicious
6. Software piracy- unauthorized copying of software
7. IRC crime- Internet Relay Chat (IRC) servers have chat rooms in which people
from anywhere the world can come together and chat with each other. It is
requested that, a summary of the above mentioned Cyber related crimes may be
published in leading newspapers in Public Interest, to make the innocent net users
aware of the same to prevent them from falling in traps of cyber criminals.
8. Credit card fraud- the unauthorized and illegal use of a credit card to purchase
property. Information about the credit card is obtained by using skimmers, the most
prone places to such crimes are restaurants, bars etc. Information about the Credit
Card is also obtained through Phishing. In case of anyone asking for
the credit card details of the user on the Internet, it is advised to first confirm
telephonically from that particular organization.
9. Net extortion- copying the company’s confidential data in order to extort said
company for huge amount.
10. Phishing- The act of sending e-mail to a user falsely claiming to be a legitimate
enterprise in an attempt to scam the user into surrendering private information that
will be used for identity theft. The e-mail directs the user to visit a Web site where
they are asked to update personal information, such as passwords and credit card,
social security, and bank account numbers, that the legitimate organization already
has

HISTORY OF CYBER CRIME


• The first recorded cybercrime took place in 1820.
• That is not surprising considering the fact that the abacus, which is thought to be
the earliest from of a computer, has been around since 3500 B.C.
• In India, Japan and China, the era of modern computer, however, began with the
analytical engine of Charles Babbage.
• The first spam email took place in 1976 when it was sent out over the ARPANT.

We can categorize cybercrime in two ways.


• The computer as a target: - using a computer to attacks other computer, e.g.
Hacking, virus/worms attacks, Dos attack etc.
• The computer as a weapon: - using a computer to commit real world crime e.g.
cyber terrorism, credit card fraud and pornography etc.

SAFETY TIPS
• Privacy Policy: Before submitting your name, e-mail, address, on a website look
for the sites privacy policy.
• Keep Software Up to Date: If the seller reduces patches for the software operating
system of your device; install them as soon as possible. Installing them will prevent
attackers from being able to take advantage. Use good password, which will be
difficult for thieves to guess. Do not choose option that allows your computer to
remember your passwords.
• DISABLE REMOTE CONNECTIVITY: Some PDA’s and phones are equipped with
wireless technologies, such as Bluetooth, that can be used to connect to other
devices or computers. You should disable these features when they are not in use.
• Use antivirus Software
• Insert Firewalls
• Uninstall unnecessary software
• Maintain backup
• Check security settings

S-ar putea să vă placă și