A Study On Different Software Used To Perform Cyber Crime
A Study On Different Software Used To Perform Cyber Crime
https://doi.org/10.22214/ijraset.2021.39395
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.429
Volume 9 Issue XII Dec 2021- Available at www.ijraset.com
Abstract: Software used to perform Cyber Crime are the most emerging subject in the field of Forensic Science. Today, the
demand of computer and other electronic devices have increased. This creates an increase in Cyber crime and its awareness.
This paper provides you vast information about methods of Cyber crime, Software used to perform cyber crime and a research
study on them. In this paper you will also learn how can a software and its algorithm perform, what footprints your device left,
what are the loopholes which help that software. This will help you for a better understanding of the software which were used to
perform cyber crime and how can you prevent yourself from such activities. If you are a Forensic Expert than you will learn
about the software tools which are used in computer forensic. I have analyzed many tools and I will share my study in this paper.
After reading you will come to know how forensic science expert backup a hard drive, or how hackers steal your information.1
Keywords: Cybercrime, Hacking, Ethical hacking, Virus, Security, Cyber Security, Network Security.
I. INTRODUCTION
Today in this world, Cyber crime was no more an extraordinary term. We all or our loving one have ever faced cyber crime. This is
because the number of internet-based devices like Desktop, Laptop, Smartphones and many more have increased. We all have seen
the Covid-19 pandemic [14] in which almost everything went online like school classes, office work, interviews, business, banking
system, doctor’s appointment and much more. This is the latest reality which increase the growth and business of electronic devices
in the world. With the increase of those devices and the advancement of Internet and technology humans are depending on those
devices, their technology and internet. But it is an unbelievable truth that not even our WIFI password is safe.
What are the things which make cyber crime easy? The answer is less awareness of the people. Today using internet is the need of
every user but very few people are aware about the internet and technology, especially how people can misuse this technology. If
you install a caller-identification software, you need to give several permissions to that application, including your contacts. Later
these contacts get stored in their database, which means your contact data was leaked.
*Author- Nabila
In the data above you can see some of the cyber crime types which are phishing and smishing, hacking, denial of service, malware,
financial fraud, pharming and extortion. Of which phishing and smishing have a greater percentage.
Here, in this paper I tell you about few software’s which are used to perform cyber crime activities. Please accept my study only for
your research. Before moving forward, it is important to tell you about some basic terms which you need to understand.
Software is the set of programming instructions, which are used to perform a tasks. These software is used to operate your system.
From Tv remote to satellite communication, software are uses everywhere. Software’s are consist of programming languages which
allow us to do a task. For example:- if you wants to open your camera in your smartphone, then you tap on camera icon. This tap on
icon tell the system that you wants to open the camera.
Every device which can connect with the internet have an IP address. IP address stands for Internet Protocol address. In easy
language you can say it a user address. Private data such as device name, mobile number, storage, device location, SIM card
information, camera, microphone, contact, IMEI, IP address are fetch by those softwares.
In Phishing user create a fake page, and ask user to input their details. For example a dummy facebook page is created and shown to
you using a popup window. Some user who want to use it fill that form. Every user input will fetch and store to hacker’s database.
Or you will receive an email that you won a lottery please input your bank account details to get the rewards. Such type of attack are
called phishing attack.
3) Denial of Service: In DoS attack the criminal send the traffic on a specific website or webpage, so that other users were not able
to access that site. Here, the criminal play with the user bandwidth by sending spam mails are by using his bandwidth. The
intention of criminal was to disturb the users who are using that website.
4) Spoofing: Spoofing is another type of cyber-crime. In this type of attack, the criminal uses software to change its system
identity or he will communicate from an unknown source.
Spoofing can be used in Desktop, smartphone and other internet-based devices. Using spoofing the hacker will manipulate his IP
address, DNS, ARP and other details.
IV. CONCLUSION
Cyber crime has created an anxiety and confusion. And the reason behind it was people are less aware about other side of the
technology and internet. It is important to know the device before using it, so that we can keep ourself protected from cyber crime
and cyber fraud. I have shared few sodtwares which were used to perform cyber crime. If you are using it in white hat way then it is
legal but if you are using it in black hat way then it is illegal. I do my study on several types of cyber attacks which are performed
using software. Then I study about the software what are these softwares and how these are used.
REFERENCES
[1] Rishav Shaw, Utkarsh Opalkar, Nayan Mathur, R. Manjula “Analysis of Web Phishing Methods” Volume 5 Issue 5 IJSR
[2] P.Harika Reddy “Cyber Security and Ethical Hacking” Volume 7 IJRASET
[3] Abhishek Gupta, Dr Jatinder Singh Manhas “A Study on Cybercrime in Jammu & Kashmir” ISSN: 2321-9653
[4] Dr. P.B Pathak “Security to Protect From Cybercrime and Security Incidents Used To Commit Cybercrime in Cyberspace” Volume 4 Issue 1 IJRASET
[5] Miss. Debalina Nandy, Mr. Renish J Padariya “An Analysis on Cyber, Cyber Threats and Role of Cyber Analyst” ISSN: 2321-96
[6] Aayad Al Hajj, Rony M “Cyber Security in the Age of COVID-19: An Analysis of Cyber-Crime and Attacks” Volume 8 Issue 8
[7] Lawrence Williams Guru 99 - https://www.guru99.com/cybercrime-types-tools-examples.htm
[8] Softwareworld - https://www.softwareworld.co/top-cybersecurity-software/
[9] Miss Priya R. Yadav, Dr. Sunil R. Gupta “Review Paper on Introduction to Cyber Forensics” Volume 9, Issue 8
[10] Neelesh Jain “Cyber Crime Changing Everything – An Empirical Study” Research gate March 2014
[11] Shilpa Yadav, Tanu Shree Yashika Arora “Cyber Crime and Security” Volume 4, Issue 8 IJSET
[12] Saquib Ahmad Khan “Cyber Crime in India: An Empirical Study” Volume 11, Issue 5
[13] Mohammed I. Alghamdi “A Descriptive Study on the Impact of Cybercrime and Possible Measures to Curtail its Spread Worldwide” Volume 9, Issue 6 IJERT
[14] Hajj, A.A& Rony “Cyber Security in the age of COVID-19: An analysis of cyber crime and attacks”