Cyber Crimes Types: On Role of Computer
Cyber Crimes Types: On Role of Computer
1. Computer As a Mean 2. When the individual is the main target of the crime, the computer can be considered the tool rather than the target. It Could be
A.
Spam: Spamming is the act of sending unsolicited messages to many users at a time, possibly up to the thousands, with the usual intention of advertising products to potential customers. Cyber Stalking: Getting the secret information from you without making you know about it.
B.
C. Fraud: When the rip-off results in some form of financial harm, then it is called fraud.
q Phishing: the act of sending faked e-mails to a user that falsely appears to come from a legitimate source. q Auction Fraud: Includes
Non Delivery, Giving false information about the item, Traingulation, Fee Stacking, Black Market Goods like pirated soft wares, Multiple Bidding Shill Bidding
Pyramid Schemes: This attracts the target by pay the money, develop the network and earn commission on a target reach.
Nigerian Scam: A letter informs the recipient about a major corporation, government agency or high-profile individuals (royalty or officials) who are in some sort of embarrassing or legal situation. The reward for lending a hand in getting them out of this trouble is a massive
D. Piracy: Piracy involves the illegal reproduction and distribution of software applications, games, movies and audio CDs. Can be done through copying the original or from Warez sites or through Cracking. E. Identity Theft: an unscrupulous person obtains enough of ones personal information to be able to impersonate you and use your identities to obtain financial gain. F. Cyber Pornography: This would include pornographic websites; pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc). G. Forgery:Counterfeit currency notes, postage and revenue
stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners.
When the computer is the main target of the crime, the computer can be considered the target rather than the tool. technical knowledge. It Could be A. Network Intrusion: Involve unauthorized entry in the network and accessing the information he needs. C. Network Attack: Network attacks concern themselves mostly with bringing down a network in order that it becomes almost totally unusable. It includes:
q Eavesdropping: secretly listening to the data traveling through the attacked network. Network Admn. Doesnt know about it. q Identity Spoofing: It involves tricking the network into believing that the hacker is using some other computer. q Denial for Service: DOS attack repeatedly attacks a particular network or server until it is too overwhelmed that it is
Requires high
C.Malware: Malware or malicious programs are written with the intention of causing various types of damages and nuisances to a computer and the information on the computer.
Viruses: A virus is a piece of computer code that hides within other programs so that it can spread from computer to computer, infecting as it travels. Viruses can damage software, your hardware, and files.
Worms: A worm, like a virus, is programmed to spread from one computer to another, but it does so without any user interaction. Worms do not need to travel through a "host" program or file. They can travel alone and replicate themselves in great volume. Worms slow down networks Trojans: computer programs that disguise themselves to be useful software, but instead they compromise your security and cause a lot of damage.
Organized Hacktivists: Hacktivists are hackers with a particular (mostly political) motive. In other cases this reason can be social activism, religious activism, etc Disgruntled Employees: the increase independence on computers and the automation of processes, it is easier for disgruntled employees to do more harm to their employers by committing computer related crimes.
Put t ing t he public or any sect ion of t he public in fear Affect ing adversely t he harm ony bet ween different religious, racial, language or regional groups or cast es or com m unit ies Coercing or overawing t he governm ent est ablished by law Endangering t he sovereignt y and India: y of t he Adjudicat ing Aut horit ies & Laws in int egrit nat ion.
Cyber Regulations Appellate Tribunal (CRAT). Cyber Crime Investigation Cell Jurisdictional Procedure The Information Technology Act 2000
1. Unauthorized Access: "Access" is defined in Section 2(1)(a) of the Information Technology Act as "gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network". Unauthorized access would therefore mean any kind of access without the permission 2. Packet Sniffing: A person is trying to access to the whole process -'C' wishes to intercept the transmission between 'A' and 'B', he would have intercept the data packets and then go on to translate them back from hex to the actual data. 3. Tempest Attack: Tempest is the ability to monitor electromagnetic emissions from computers in order to reconstruct the data. 4. Password Cracking: computer attempts to "cache" the password so that internal prompts during the same session do not cause external prompts to the user and this cache can be hacked. 5. Buffer Overflow: It involves input of excessive data into a computer. The excess data "overflows" into other areas of the computer's memory. This allows the hacker to insert executable code along with the input, thus enabling the hacker to break into the computer.