Sie sind auf Seite 1von 4

S.

Oula

Semester VI Cultural Study Student

CYBERCRIME

INTRODUCTION

I- DEFINITION OF CYBERCRIME

II- TYPES OF CYBERCRIME

a. Computer-based fraud b. Child Pornography c. Computer Viruses

CONCLUSION

Prof : Mr Moubtassime

S. Oula

Semester VI Cultural Study Student

S. Oula

Semester VI Cultural Study Student

INTRODUCTION

You may think the penalties for breaking into a home or car (personal property) and breaking into a home computer or laptop (personal property) would be the same at the same geographic location. Not necessarily. Cybercrime is either a crime that requires a computer system to complete the crime or a crime where the computer system is the target of the crime. The only difference between a crime and a cybercrime are the tools used to pr pare for and complete the crime. Our aim e here is to target the cyber-criminality as part of something even more dangerous than physical harms, since the laws against it are few, almost inexistent. We will deal with some aspects of cybercriminality since the range of it is huge.

I-

DEFINITION OF CYBERCRIME

Cybercrime merely is any use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the internet has grown in importance as the computer has become central to commerce, entertainment, and government. Online activities are just as vulnerable to crime and can compromise personal safety just as effectively as common everyday crimes. Lawmakers, law enforcement, and individuals need to know how to protect themselves and the persons for which they are responsible. The European Commission defines crime by three categories of crime.  Traditional Forms of Crime (fraud and forgery = computer fraud, false credit cards ...)  Dissemination of illegal content over electronic media (sexual- violence against children, incitement to racial hatred ...).  Crimes unique to electronic networks That is to say attacks on information systems, denial of service and hacking.... You can see by the explanations of various cybercrimes below that the crimes have existed long before computers and the internet were made available to the general public. The only difference involves the tools used to commit the crime.

S. Oula

Semester VI Cultural Study Student

S. Oula

Semester VI Cultural Study Student

II-

EXAMPLES-TYPES OF CYBERCRIME

Since all those categories regroup a large amount of crimes, we are going to just select some of them.

 A-Computer-based fraud
Computer-based identity theft typically involves perpetrators deceptively assuming the identity of another individual without the expressed consent with the intent of committing a crime; fraudulent and illicit attainment of personal information through the usage of unsecured websites may result in the victims of identity theft undergoing the loss of finances (in Credit Card fraud). Personal safety, and privacy, by doing so, It can hijack your bank/card account and steal your money. Forgery is another aspect of Computer fraud; it s a criminal act which is deliberate and intentional in nature. Although various means of Identity Theft exist, the multitude of results of this crime that span the severity of consequence are fairly uniform; victims of identity fraud may experience the loss of privacy, safety, security, and finances. Identity Theft undertaken by individuals engaging in credit card fraud may be committed over the computer with regard to the reception of stolen property purchased as a result of illegally obtaining another individual s financial data and credit card information. Due to the fact that the ability to purchase items and services through the internet creates a virtual marketplace in which credit card numbers - as well as other pertinent financial information must be entered into a websites, the risk for hijacked information and subsequent Identity Theft is increased. An act of forgery includes the purposeful defrauding, misleading, deception, and misrepresentation of a product, service, or item. Forgery can take place in a variety of settings, including the forged and illegal reproduction of items. Intellectual property theft includes plagiarizing the work of other people, or using music and images without permission. It can also involve criminals using websites to download illegally, steal music, videos, books and images

 B- Child Pornography
One area of Internet pornography that has been the target of the strongest efforts at curtailment is child pornography. Child pornography is the use of computer networks to create, distribute, or access materials that sexually exploit underage children. Soliciting underage children through chat rooms or having child pornography is also a form of cyber crime. In recent years, the FBI has been monitoring children and young adult chat rooms with the hope of preventing child exploitation. In some instances these communications may be illegal. One prolific type of computer forensic crimes is child exploitation. This refers to producers of images and film of child abuse, and those who travel to have sex with minors. Children are often exploited over the internet, newsgroups, and peer-to-peer trading. Those criminals that exploit children may operate within groups or as individuals. They use the computer to exploit and market children.

S. Oula

Semester VI Cultural Study Student

S. Oula

Semester VI Cultural Study Student

 C- Computer Viruses
The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appe ars harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. As defined, the viruses are computer programs that infect a computer, made for hacking/cracking another program, either to just spy that latter, either to destroy the program as seen below. The one responsible of those malicious programs are hackers and crackers. Since mass media defined hackers as people who use deficiencies in operating systems to infiltrate computers to destroy data and steal information for their own illegal purpose. Crackers are considered by Hackers as mere destroyers, since a hacker defined himself originally as a person with a desire to learn about technology and to experiment and who is technically proficient with whatever systems they hacked. While crackers defined themselves as hackers, since they consider themselves to have the same desires as hackers. To mark the difference between a hacker and cracker, a cracker state Hacker builds, Cracker destroys . But is there any difference of doing whatever since it is illegally?

CONCLUSION

To summarize, cyber-crime has turned into a well-developed underground market of massive magnitudes. Attack methods are getting more sophisticated every day and organizations of all sizes are potential targets. So what can be done to protect your valuable assets? First of all, it is important to take an overall approach to IT (Information) security. At the same time, we can conclude that most organizations have already implemented anti-malware software, firewalls and other reactive measures. Unfortunately, that is no longer enough. With today s complex and open network infrastructures combined with a true explosion in security vulnerabilities in commonly used operating systems, applications, and hardware components a more proactive approach is needed . Unfortunately the fight against cybercrime is not easy. There are several legal and nonlegal obstacles to this fight. First, the broad nature of computer networks, but also the speed of the offenses, the difficulty of gathering evidence, and finally methods of investigation and control that can be detrimental to human rights, particularly the right to anonymity and freedom of expression. On 23 November 2001, members of the Council of Europe and the United States, Canada, Japan and South Africa, have adopted the Convention on Cybercrime, the culmination of a long process of negotiations (twenty-seven earlier versions and four years of formal negotiations) It is an agreement with an international criminal intended to fight against cybercrime. In 2007, only 14 States had ratified the Convention on the 47 signatories So many countries have undertaken . actions about Cybercrime and cybercriminals, but is it even sufficient? We are building our lives around our wired and wireless networks. The question is, are we ready to work together to defend them?

S. Oula

Semester VI Cultural Study Student

Das könnte Ihnen auch gefallen