Latest

an>

Friday, 30 November 2018

Crimes involving Computer as Weapon



Defamation

v The act of any intentional False communication that harms the reputation of an individual business product, government or a nation is called defamation
v Defamation is also known as calumny vilification or traducement
v Banking and credit card related crime, E-Commerce and investment fraud online sale of illegal articles, online gambling etc also come under cyber crime

Forgery

v Forgery includes counterfeit currency notes postage and revenue stamps, mark sheets etc can be forged using sophisticated computers printers and scanners
v Impersonization of another person is also considered as forgery

Email bombing

v Repeatedly sending an email message to particular address for abuses
v It is a type of denial of service attack
v Unauthorised use of internet hours paid for by another person is known as the theft of Internet hours

 Email spoofing

v Creation of email messages with fake sender address to mislead the recipient
v In other word email spoofing is a technique commonly used to hide the origin of an email message
v Spamming and phishing uses email spoofing
v Email spoofing in India charges the offender for forgery under section IPC 463

Spamdexing

*  Spamdexing or search engine spamming is the practice of deliberately and dishonestly modifying HTML pages to increase the chance of them being placed close to the beginning of the search engine result

    
     Email spamming

v Use of emails for sending unsolicited bulk emails and commercial messages over the internet

Intellectual property right

v Intellectual property infringement is the violation of an intellectual property right
v Intellectual property right violations include Trademark violations computer source code test, pattern violation and software piracy
v Under  intellectual property law owners are guaranteed certain exclusive rights to a variety of intangible assets such as inventions, discoveries , artistic and musical works etc


*  Theme of World intellectual property  day (April 26) 2016 digital creativity culture reimagined
*  Theme of World Intellectual Property day 2017 - innovation improving lives
*  Position of India in intellectual property index 2017 - 43


Pornography

v Pornography is the portrayal of sexual acts for the purpose of sexual excitement
v Persons who intentionally Prey upon children are known as pedophiles
v Pedophiles eams children’s especially teens trust and gradually seduced them in to  sexual or indecent act

Cyber Stalking

v Practice of using internet to harass or threaten someone
v This can be avoided by not disclosing any personal information, avoid sending photographs to strangers and chat friends, proper disconnection of Internet after its use
v It is also known as cyber bullying

Website defacement

v Website defacement is an attack on a website that changes the visual appearance of the site or a web page
v Hackers may choose to deface a website for a number of reasons in many cases website defacement is done purely for fun

Pharming

v Pharming is a cyber attack which malicious code is installed on a personal computer or server mis directing uses to fraudlent website without their knowledge or consent
v Pharming is also known as phishing without a Lure
v Pharming can be conducted either by changing the host file on a victims computer or by exploitation of a vulnerability in DNS server software
v A particularly ominous pharming tactic is known as domain name system poisoning
v in DNS poisoning the domain name system table in a server is modified so that someone who thinks they are accessing legitimate websites is actually directed towards fraudulent ones

Domain name system (DNS)  is used to resolve human readable hostnames into machine readable IP addresses



Snooping

v Snooping is the unauthorised access to another persons or companies data
v Snooping can include casual observance of an email that appears on another computer screen or watching what someone else is typing
v More sophisticated snooping user software program to remotely monitor activity on a computer or network devices

Eavesdropping

v Eavesdropping is the unauthorised real-time interception of a private communication such as phone call, instant message, fax transmission etc

Salami attack

v Salami attack is when small  attack add up to 1 major attack that can go undetected due to the nature of this type of cybercrime
v It is a form of cybercrime usually used for the purpose of committing financial crimes normally in banks
v It is also known as penny shaving

Backdoor

v A backdoor is a means of access to a computer program that bypasses security mechanism
v The back door is written by the programmer who create the code for the program
v A backdoor is a potential security risk because there are always crackers out there looking for any vulnerability to exploit
v A programmer may sometimes install a back door so that the program can be accessed for troubleshooting or other purposes

Cyber vandalism

v Cyber vandalism means destroying or damaging the data or information stored in a computer when a network service is stopped or disrupted
v Cyber vandals are individuals who damage information and infrastructure purely for their own enjoyment and pleasure
v It include any kind of physical harm done to the computer of any person
v These acts may take the form of the theft of a computer some part of a computer or device attached to the computer

Cybersquatting

v It is the act of registering a domain name that is the same as or confusingly similar to The trademark of another and then offering to sell that domain and Back To The trademark owner
v Cybersquatting is also known as domain squatting

Cyber espionage

v Cyber espionage describes the stealing of secret stored in digital formats on computers and it network
v Cyber espionage can be conducted through advanced persistent threat remote access Trojan

Advanced persistent threat (APT)
v An advanced persistent threat is a network attack in which an unauthorised person gains access to a network and stay there undetected for a long period of time
v The intention of and APt attack is to steal data rather than to cause damage to the network or organisation

Remote access Trojan (RAT)

v A remote access Trojan is a Malware program that includes a backdoor for administrative control over the target computer
v RAT are usually download invisible with a user requested program
v Once the host system is compromised the Intruder may use it to distribute RATs to other vulnerable computers and establish a botnet
v RATs are also known as remote administrative tool

Cyber slacking

v The use of an employees internet and email for personal activities during work hours is called cyber slacking
v Employees who uses company resources like computer and internet for personal activities at work time are called cyber slacker

Data Diddling

v Data diddling is the unauthorised changing of data before or during their input to a computer system
v example forgery, exchanging valid records with prepared replacement etc




Hacking

v Process of unauthorised access of information system is known as hacking
v One who does hacking is called hacker
v Hacker destroys defects or alters the information in a computer resource
v Hackers are of different categories such as White hat hackers, Black hat hackers, Grey hat hackers etc
v White hat hackers hack system for good reason
v Black hat hackers hack the system for malicious reason
v Grey hat hackers hack system sometimes for good reason and sometimes for malicious reason

Hacktivism

v It is the act of hacking a website or computer network in an effort to convey a social or political message
v The person who carries out the act of hacktivism is known as hacktivist

Web jacking

v Hacking of website by password cracking and alteration of contents for fulfilling politics objectives or for money
v Web jacking punishes the offender  Under  IPC 383

Botnet

v A botnet is an interconnected network of computers infected with Malware without the users knowledge and controlled by cyber criminals
v Botnet it is also known as Zombie Army

Password sniffer

v It is a small program that monitor and retrieve the username or password of network users during their login

Identity theft

v Procurement of identifying information without permission and using it  fraudulently to obtain goods and service is called identity theft
               
Software piracy

v Unauthorised copy reproduction use or manufacture of product is called software piracy

Software cracking

v Modification of software to remove or disable features which are undesirable by a person is called software cracking

No comments:

Post a Comment