0% found this document useful (0 votes)
65 views9 pages

Cyber Crimes Types: On Role of Computer

This document discusses different types of cyber crimes and people involved in cyber crimes. It outlines several types of cyber crimes where the computer is used as a tool or target. Crimes using computers as tools include spam, cyber stalking, fraud, and identity theft. Crimes targeting computers include network intrusion, network attacks like denial of service, and malware like viruses and worms. The document also discusses people commonly involved in cyber crimes like kids, organized hacktivists, disgruntled employees, and professional hackers. It outlines some motives and controls in India like the Information Technology Act 2000.

Uploaded by

Parun Bansal
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views9 pages

Cyber Crimes Types: On Role of Computer

This document discusses different types of cyber crimes and people involved in cyber crimes. It outlines several types of cyber crimes where the computer is used as a tool or target. Crimes using computers as tools include spam, cyber stalking, fraud, and identity theft. Crimes targeting computers include network intrusion, network attacks like denial of service, and malware like viruses and worms. The document also discusses people commonly involved in cyber crimes like kids, organized hacktivists, disgruntled employees, and professional hackers. It outlines some motives and controls in India like the Information Technology Act 2000.

Uploaded by

Parun Bansal
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Cyber Crimes Types: On Role of Computer

1. Computer As a Mean 2. When the individual is the main target of the crime, the computer can be considered the tool rather than the target. It Could be

A.

Spam: Spamming is the act of sending unsolicited messages to many users at a time, possibly up to the thousands, with the usual intention of advertising products to potential customers. Cyber Stalking: Getting the secret information from you without making you know about it.

B.

C. Fraud: When the rip-off results in some form of financial harm, then it is called fraud.
q Phishing: the act of sending faked e-mails to a user that falsely appears to come from a legitimate source. q Auction Fraud: Includes
Non Delivery, Giving false information about the item, Traingulation, Fee Stacking, Black Market Goods like pirated soft wares, Multiple Bidding Shill Bidding

Pyramid Schemes: This attracts the target by pay the money, develop the network and earn commission on a target reach.

Nigerian Scam: A letter informs the recipient about a major corporation, government agency or high-profile individuals (royalty or officials) who are in some sort of embarrassing or legal situation. The reward for lending a hand in getting them out of this trouble is a massive

D. Piracy: Piracy involves the illegal reproduction and distribution of software applications, games, movies and audio CDs. Can be done through copying the original or from Warez sites or through Cracking. E. Identity Theft: an unscrupulous person obtains enough of ones personal information to be able to impersonate you and use your identities to obtain financial gain. F. Cyber Pornography: This would include pornographic websites; pornographic magazines produced using computers (to publish and print the material) and the Internet (to download and transmit pornographic pictures, photos, writings etc). G. Forgery:Counterfeit currency notes, postage and revenue

stamps, mark sheets etc can be forged using sophisticated computers, printers and scanners.

Cyber Crimes Types: When Computer As a Target 2. Computer As a Target

When the computer is the main target of the crime, the computer can be considered the target rather than the tool. technical knowledge. It Could be A. Network Intrusion: Involve unauthorized entry in the network and accessing the information he needs. C. Network Attack: Network attacks concern themselves mostly with bringing down a network in order that it becomes almost totally unusable. It includes:
q Eavesdropping: secretly listening to the data traveling through the attacked network. Network Admn. Doesnt know about it. q Identity Spoofing: It involves tricking the network into believing that the hacker is using some other computer. q Denial for Service: DOS attack repeatedly attacks a particular network or server until it is too overwhelmed that it is

Requires high

C.Malware: Malware or malicious programs are written with the intention of causing various types of damages and nuisances to a computer and the information on the computer.
Viruses: A virus is a piece of computer code that hides within other programs so that it can spread from computer to computer, infecting as it travels. Viruses can damage software, your hardware, and files.
Worms: A worm, like a virus, is programmed to spread from one computer to another, but it does so without any user interaction. Worms do not need to travel through a "host" program or file. They can travel alone and replicate themselves in great volume. Worms slow down networks Trojans: computer programs that disguise themselves to be useful software, but instead they compromise your security and cause a lot of damage.

Cyber Crimes Types: When Computer As a Target


D.Cyber Terrorism: the act of carrying out terrorism using cyberspace, or in other words, the Internet. It is the hacking or attacking of networks and computers to obtain or modify information for political and/or social objectives. E. F. Defacement: It is the act of intruding into a server and changing without permission all the aspects of a website which the public can see.

People Behind Cyber crimes: Cyber criminals


A. Categories
Kids (Age Group 9-16 etc.): They consider that hey know lot about computers and proud to hack a website for fun.

Organized Hacktivists: Hacktivists are hackers with a particular (mostly political) motive. In other cases this reason can be social activism, religious activism, etc Disgruntled Employees: the increase independence on computers and the automation of processes, it is easier for disgruntled employees to do more harm to their employers by committing computer related crimes.

Professional Hackers: All information are now a

Put t ing t he public or any sect ion of t he public in fear Affect ing adversely t he harm ony bet ween different religious, racial, language or regional groups or cast es or com m unit ies Coercing or overawing t he governm ent est ablished by law Endangering t he sovereignt y and India: y of t he Adjudicat ing Aut horit ies & Laws in int egrit nat ion.
Cyber Regulations Appellate Tribunal (CRAT). Cyber Crime Investigation Cell Jurisdictional Procedure The Information Technology Act 2000

Motives Behind Cyber Crimes & Controls Authorities in India

1. Unauthorized Access: "Access" is defined in Section 2(1)(a) of the Information Technology Act as "gaining entry into, instructing or communicating with the logical, arithmetical, or memory function resources of a computer, computer system or computer network". Unauthorized access would therefore mean any kind of access without the permission 2. Packet Sniffing: A person is trying to access to the whole process -'C' wishes to intercept the transmission between 'A' and 'B', he would have intercept the data packets and then go on to translate them back from hex to the actual data. 3. Tempest Attack: Tempest is the ability to monitor electromagnetic emissions from computers in order to reconstruct the data. 4. Password Cracking: computer attempts to "cache" the password so that internal prompts during the same session do not cause external prompts to the user and this cache can be hacked. 5. Buffer Overflow: It involves input of excessive data into a computer. The excess data "overflows" into other areas of the computer's memory. This allows the hacker to insert executable code along with the input, thus enabling the hacker to break into the computer.

Tools & Techniques Used in Cyber Crimes

You might also like