Sie sind auf Seite 1von 32

Cyber crime refers to any crime that involves a computer and a network.

The computer may have been used in the commission of a crime, or it may be the target.

Computer viruses Denial-of-service attacks Malware (malicious code)

Cyber stalking Fraud and identity theft Information warfare Phishing scams

The Information Technology Act 2000 is an Act of the Indian Parliament (No 21 of 2000) notified on October 17, 2000. IT Act 2000 consisted of 94 sections segregated into 13 chapters.

Legal Recognition of Electronic Documents Legal Recognition of Digital Signatures Offenses and Contraventions Justice Dispensation Systems for Cybercrimes

Hacking in simple terms means an illegal intrusion into a computer system or network. Hackers write or use ready-made computer programs to attack the target computer. Government websites are the hot targets of the hackers due to the press coverage, it receives.

Greed Power Publicity Revenge Adventure Desire to access forbidden information Distractive mindset

Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. A phishing technique was described in detail in 1987. the first recorded use of the term "phishing" was made in 1995 by Jason Shannon of AST Computers.

Never respond to requests for personal information like passwords via e-mail (or phone!).
Legitimate businesses do not request such information this way.

Visit web sites of companies with which you have business by manually typing the company URL.
Do not click on links in unexpected e-mails because they can be spoofed. Along the same lines, do not call phone numbers found in those e-mails.

Be aware of URLs that do not have the company name directly before the toplevel domain.
For example, bankofamerica.com is the correct URL, bankofamerica.pp.com is questionable.

Routinely review your credit card and bank statements for unusual activity.

SPOOFING is a situation in which one person or program successfully masquerades as another by falsifying information/data and thereby gaining an illegitimate advantage.

IP Spoof Web Spoof E-mail Spoof Non Technical Spoof

The creation of IP packets with a forged source. The purpose of it is to conceal the identity of the sender or impersonating another computing system.

Denial-of-service attack To defeat networks security

E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.

Double check the email you are replying to, make sure that the letters are what they truly seem. For example, l(lower case L) is not the same as I(upper case i). Look at the IP information of the email header. If an email originated from inside your network, the sender should have very similar IP address.

Data diddling is the changing of data before or during entry into the computer system. Example includes forging or counterfeiting documents used for data entry and exchanging valid disks and taped with modified replacements.

This is an act by the criminal, who floods the bandwidth of the victim network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.

Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

Simple-Unstructured Advanced-Structured Complex-Coordinated

Extortion is thriving in cyberspace, with malicious software denying users access to their computers or files until they pay a ransom. Cyber extortion is a crime involving an attack or threat of attack against an enterprise, coupled with a demand for money to avert or stop the attack.

Cyber extortion can take many forms. Originally, denials of service attacks were the most common method. Cyber extortion can be lucrative, netting attackers millions of dollars annually.

The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. The internet is very fast becoming a household commodity in India. Its explosion has made the children a viable victim to the cyber crime.

Pedophiles use false identity to trap the children/teenagers Pedophiles contact children/teens in various chat rooms which are used by children/teen to interact with other children/teen. Befriend the child/teen. Extract personal information from the child/teen by winning his confidence.

Gets the e-mail address of the child/teen and starts making contacts on the victims e-mail address as well. Starts sending pornographic images/text to the victim including child pornographic images in order to help child/teen shed his inhibitions so that a feeling is created in the mind of the victim that what is being fed to him are normal and that everybody does it.

Extract personal information from child/teen At the end of it, the pedophile set up a meeting with the child/teen out of the house and then drags him into the net to further sexually assault him or to use him as a sex object.

Software Piracy is the use of works under copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce, distribute, display or perform the copyrighted work, or to make derivative works, without permission from the copyright holder, which is typically a publisher or other business representing or assigned by the work's creator.

Pricing Unavailability Usefulness Shopping experience Anonymity

Das könnte Ihnen auch gefallen