Tuesday, February 9, 2010

CS101

Cyber Crime:-
Cyber crime is criminal activity done using computers and the Internet. This includes
anything from downloading illegal music files to stealing millions of dollars from online
bank accounts. Cyber crime also includes non-monetary offenses, such as creating and
distributing viruses on other computers or posting confidential business information on
the Internet.
OR
Issues surrounding computer crime have become high-profile, particularly those
surrounding hacking, copyright infringement, child pornography, and child grooming.
There are also problems of privacy when confidential information is lost or intercepted,
lawfully or otherwise.
Two Types of Cyber Crime…
Computer crime encompass a broad range of potentially illegal activities. Generally,
however, it may be divided into one of two types of categories:
(1) crimes that target computer networks or devices directly;
(2) crimes facilitated by computer networks or devices, the primary target of which is
independent of the computer network or device.
Examples of crimes that primarily target computer networks or devices would include,
• Malware (malicious code)
• Denial-of-service attacks
• Computer viruses
Examples of crimes that merely use computer networks or devices would include,
• Cyber stalking
• Fraud and identity theft
• Phishing scams
• Information warfare
More Examples…..
*Fraud achieved by the manipulation of computer records.
* Spamming wherever outlawed completely or where regulations controlling it
are violated.
* Deliberate circumvention of computer security systems.
* Unauthorized access to or modification of
o programs (see software cracking and hacking).
o data.
* Intellectual property theft, including software piracy.
* Industrial espionage by means of access to or theft of computer materials.
* Identity theft where this is accomplished by use of fraudulent computer
transactions.
* Writing or spreading computer viruses or worms.
* Salami slicing is the practice of stealing money repeatedly in extremely small
quantities
* Denial-of-service attack, where company websites are flooded with service
requests and their website is overloaded and either slowed or crashes completely
* Making and digitally distributing child pornography
Now take Examples which one u like and give very briefly
the methods that can be used to minimize the ill effects of
listed crimes.

No comments: