Sunteți pe pagina 1din 13

Computer / Cyber crimes

Alternatively referred to as cybercrime, e-crime, electronic crime,


or hi-tech crime.
WHAT IS CYBER CRIME?
Cybercrime is defined as a crime in which a computer is the object of
the crime (hacking, phishing, spamming) or is used as a tool to
commit an offense (child pornography, hate crimes).
OR
Cybercrimes can be defined as: "Offences that are committed against
individuals or groups of individuals with a criminal motive to
intentionally harm the reputation of the victim or cause physical or
mental harm, or loss, to the victim directly or indirectly, using modern
telecommunication networks such as Internet, computers and mobile
phones.
OR
Criminal activity or a crime that involves the Internet, a computer
system, or computer technology
OR
crime that is committed using the Internet, for example by stealing
somebody’s personal or bank details or infecting their computer with
a virus

• Cybercriminals may use computer technology to access personal information,


business trade secrets and use the internet for exploitative or malicious
purposes.
• Criminals can also use computers for communication and document or data
storage. Criminals who perform these illegal activities are often referred to as
hackers.
:
1. CRIME AGAINST INDIVIDUALS

I.
Cybercrimes committed against individual persons include such types of crimes like
transmission of Child Pornography, Harassment of any one with the use of a computer
such as e-mail, Cyber Defamation, Hacking, Indecent exposure, Credit Card Fraud and
Dissemination of obscene material etc.
II. Cyber Crimes committed against property of Individuals include computer vandalism (It
is a process wherein there is a program that performs malicious function such as
extracting a user's password or other data or erasing the hard disk), Intellectual Property
Crimes etc.
2. CRIME AGAINST ORGANIZATION
The third type of Cyber-crimes classification relate to Cybercrimes against organization i.e.
unauthorize access over the computer system of governments, firms, group of individuals etc.
Cyber Terrorism is one discrete kind of crime in this kind. This crime obvious itself into terrorism
when a human being "cracks" into a government or military maintained website.
3. CRIME AGAINST SOCIETY
The fourth type of Cyber-crimes relate to Cybercrimes against society. In this category forgery,
cyber terrorism, polluting the Youth through Indecent, Financial Crimes, Sale of Illegal Articles
etc.

What are conventional crimes?

• "Conventional crimes are those traditional, illegal behaviors that most people
think of as crime.
• Conventional crime includes murder, rape, assault, robbery, burglary and theft.

Difference Between cybercrime and conventional crime

The concept of cybercrime is not radically different from the concept of conventional
crime. Both include conduct whether act or omission, which cause breach of rules of law
and counterbalanced by the sanction of the state.

However, there are certain differences between the two. It would be relevant to points
out these similarities and differences between the two.

• Cyber criminals refuse to be bounded by the conventional jurisdictional areas of


nations, originating an attack from almost any computer in the world, passing it
across multiple national boundaries, or designing attacks that appear to be
originating from foreign sources. Such techniques dramatically increase both the
technical and legal complexities of investigating and prosecuting cybercrimes.

• Unlike conventional crimes against persons or property such as rape, burglary


and murder, cybercrimes are very skill intensive. Stock of hacking skills is thus a
prerequisite to cyber/online crimes.

REASONS BEHIND THE CYBER CRIME


There are many reasons why cyber-criminals are doing cyber-crime; chief among them
are mentioned below:
➢ For the sake of recognition.
➢ For the sake of quick money.
➢ To fight a cause, one thinks he believes in
➢ Low marginal cost of online activity due to global reach.
➢ Catching by law and enforcement agency is less effective and more expensive.
➢ Official investigation and criminal prosecution is rare.
➢ No concrete regulatory measure.
➢ Lack of reporting and standards
➢ Difficulty in identification

computer forensics (cyber forensics)

➢ Forensic means the application of scientific methods and techniques to the


investigation of crime.

➢ Computer forensics is the application of investigation and analysis techniques to


gather and preserve evidence from a particular computing device in a way that is
suitable for presentation in a court of law.

➢ The goal of computer forensics is to perform a structured investigation while


maintaining a documented chain of evidence to find out exactly what happened
on a computing device and who was responsible for it
BIGGEST CHALLENGES IN DIGITAL FORENSICS
➢ Encryption
➢ Legal Challenges
➢ Growth in Digital Crimes
➢ Lack of Resource
➢ Cross-border Cooperation
➢ Latest Emerging Technologies
➢ Lack of Intelligence etc.

Cyber Criminals and their objectives

Cybercriminals are individuals or teams of people who use technology to

commit malicious activities on digital systems or networks with the intention

of stealing sensitive company information or personal data, and generating

profit.
Common Types of Cyber Criminals

1. Identity Thieves

Identity thieves are cyber criminals who try to gain access to their victims’ personal
information – name, address, phone number, place of employment, bank account, credit
card information and social security number. They use this information to make financial
transactions while impersonating their victims. Identity theft is one of the oldest
cybercrimes, gaining prominence during the early years of the Internet.

2. Internet Stalkers

Internet stalkers are individuals who maliciously monitor the online activity of their
victims to terrorize and/or acquire personal information. This form of cybercrime is
conducted through the use of social networking platforms and malware, which are able
to track an individual’s computer activity with very little detection. The motives for such
attacks can differ depending on the cybercriminal, but many internet stalkers seek to
acquire important information that they can use for bribery, slander, or both.

3. Phishing Scammers

Phishers are cyber criminals who attempt to get ahold of personal or sensitive
information through victims’ computers. This is often done via phishing websites that are
designed to copycat small-business, corporate or government websites.

4. Cyber Terrorists

Cyber terrorism is a well-developed, politically inspired cyber-attack in which the


cybercriminal attempts to steal data and/or corrupt corporate or government computer
systems and networks, resulting in harm to countries, businesses, organizations, and
even individuals. The key difference between an act of cyberterrorism and a regular
cyber-attack is that within an act of cyber terrorism, hackers are politically motivated, as
opposed to just seeking financial gain.

Objectives of Cyber Criminals

a) Money
b) Entertainment
c) Political gains
d) Entrance into a social group
e) To maintain status in hacking community (competition)
Issues relating to Investigation in Cyber crimes

S-ar putea să vă placă și