Sunteți pe pagina 1din 3

CYBER-TERRORISM AND

CYBER-CRIME
Gauri Suryavanshi
Student IF4G
Shivajirao S. Jondhale Polytechnic, Ambernath

Tanvi Uparwat
Student IF4G
Shivajirao S. Jondhale Polytechnic, Ambernath

Abstract— As we all know that cybercrime has been one


of the common practices made by the computer expert. This A. Categories of Cybercrime and Cyber terrorism
paper mentions some of the impact of the cybercrime.
Cybercrime is that activities made by the people for We can categorize cybercrime in two ways:-
destroying organization network stealing, documents,
hacking bank account and so no.This paper gives detailed  The computer as a target:-Using a computer to
information regarding cybercrime. Finally the research on attack other computer.E.g:-Hacking, Virus Attacks,
the crime made by the misuse of cybercrime in some of the etc.
field like in hacking, computer vandalism, software piracy,  The computer as a weapon:-Using a computer to
etc. commit real world crime. E.g.:-Credit card fraud,
Cyber terrorism is the new terrorist tactic that makes use of cyber terrorism, etc.
information system and digital technology, especially the
internet, as either an instrument or an target. This paper also B. Types of Cybercrime
mentions how cyber terrorism works, types of cyber  Hacking:-Hacking in simple terms means illegal
terrorism, prevention, etc. instruction info a computer system and network.
Government websites are the hot target of the
hackers due to press coverage, it receives.
Keywords—Cyber-crime, Cyber-terrorism, Hacking, Denial
 Computer Vandalism:-Damaging or destroying
of service, Software piracy, etc.
data rather than stealing or misusing them is
called cyber vandalism.
I. INTRODUCTION
 Software piracy:-Theft of software through the
Cybercrime is an activity done using computers and internet. illegal copying of genuine
We can say that it is an unlawful act involving computers programs.Distrubution of products intended to
and networks. Cybercrime incorporates anything from pass for the original.
downloading illegal music files to stealing of dollars from
online bank accounts.  Forgery:-It is a criminal act that takes place
when a person falsifies something with the intent
Cyber terrorism is a phrase used to describe the use of to deceive another person or entity.
internet based attacks in terrorist activities including act of
deliberate large scale disruption of computer networks,  Distribution of pirated software: -It means
especially of personal computers attached to the internet, by distributing pirated software from one computer
the means of tools such as computer viruses.
to another intending to destroy the data and
official records of the government.
History of Cybercrime and Cyber terrorism
The first recorded cybercrime took place in 1820.That is not C. Types of Cyber terrorism
surprising considering the fact that the abacus, which is
thought to be the earliest form of the computer, has been  Website defacement: - It is an attack on a website
around since 3500B.C.The first spam e-mail took place in that changes the visual appearance of the site or a
1976 when it was sent out over the ARPANET. webpage. This is typically the work of system
Cyber terrorism has been around since the late 1980’s, crackers, who break into a wed server and replace
however the number of internet terrorism have only the hosted website with one of their own.
increased since the September 11attack on the United States.
Some examples of cyber terrorism activities include email  Denial of service attack:-A denial of service is any
bombing, hacking into government portals, banking, water type of attack where the attackers attempt to prevent
and hospital websites to either generate fear or endanger the legitimate users from excessing the services.
lives of many.
 Network damage and disruptions:-The main aim  Viruses -85%
of cyber terrorist’s activities is to cause network
damage and their disruptions. This activity may  Denial of service -27%
divert the attention of the security agencies for the
True incident of cyber crime
time being thus giving the terrorists extra time and
makes their task comparatively easier. SONY SAGA- on 24 November 2014, a hacker group
which identifies itself by the name “Guardians of Peace
(GOP) leaked a release of confidential data from the film
studio Sony pictures. The data included personal information
about Sony pictures employees and their families, e--mails
between employees, information about executive salaries at
the company, copies of then-unreleased Sony films and other
information. In December 2014, the GOP group demanded
that Sony pull its film The Interview, a comedy about a plot
to assassinate North Korean leader Kim Jong-Un, and
threatened terrorist attacks at cinemas screening the film.
Sony elected to cancel the film’s formal premiere and
mainstream release, opting to skip directly to a digital release
followed by a limited theatrical release the next day.

Cyber law of India:- True incident of cyber terrorism


AHMEDABAD BOMB BLAST: - The 2008 Ahmedabad
Cybercrime can involve criminal activities that are bombings were a series of 21 bomb blasts that
traditional in nature. Such as theft, fraud, deformation and hit Ahmedabad, India, on 26 July 2008, within a span of
mischief, all of which are subjected to the Indian penal code. 70 minutes. 56 people were killed and over 200 people were
The abuse of computers has also given birth to a gamut of injured. Ahmedabad is the cultural and commercial heart of
new age crimes that are addressed by the information Gujarat state, and a large part of western India. The blasts
technology, 2000. were considered to be of low intensity, and were similar to
the Bangalore blasts, Karnataka which occurred the day
Cybercrime threatens National Security
before. Several TV channels said they had received an e-mail
Cybercrime threatens national security in India, likewise from a terror outfit called Indian Mujahedeen claiming
union home minister Shivraj Patil said that the rising level of responsibility for the terror attacks; Islamic militant
cyber-crime is an indication of enormous threat to national group Harkat-ul-Jihad-al-Islami, however, has claimed
security. On social networking site orkut, facebook have responsibility for the attacks. The Gujarat police arrested the
been perplexing authorities. Fan clubs of Underworld dons suspected mastermind, Mufti Abu Bashir, along with nine
like Dawood Ibrahim and Chhota Shakeel and other wanted others, in connection to the bombings.
underworld dons are also doing the rounds on orkut.There is
a huge potential for damage to national security through Conclusion
cyber-attacks. Though not all peoples are victims to cybercrimes, there
are still at risk. Crimes by computer vary and they don’t
Safety measures to cyber crime always occur behind the computer. The hacker could live
three continents away from its victim and they wouldn’t even
 Use antivirus software.
know they were being hacked. Crimes done behind the
 Insert firewall. computer are 21st century’s problem. With the technology
increasing criminals don’t have to rob banks, nor do they
 Uninstall unnecessary software. have to be outside in order to commit any crime. They have
everything they need on their lap. Their weapons aren’t guns
 Maintain backup. anymore; they attack with mouse cursors and passwords.
 Check security setting.
Reference
 Don’t respond to harassing or negative messages.
1. The Cyber Effect.
Safety measures to cyber terrorism
2. Prevention Of Cyber Crime And Fraud
 Be cautious about opening email attachment.
Management.
 Complete software updates. 3. Cyber War.
 Create difficult passwords. 4. Policing Cyber Hate, Cyber Threats and Cyber
 Uninstall unused application of service. Terrorism.

Types of Cyber-attacks by percentage


 Financial Fraud - 11%
 Sabotage of data/networks -17%
 Employee abuse of internet privileges -79%

S-ar putea să vă placă și