My TechnoBlogs

For those who can create wonders with Technology……

Posts Tagged ‘Cyber Terrorism.’

Evolution of Cyber Crime

Posted by Ravi shankar on March 2, 2009

Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief. The new age crimes such as hacking, web defacement, cybe stalking, web jacking etc.

Cyber crime is a unlawful acts wherin the computer is either a tool or a target or both.

The computer includes the laptop, desktop, PDA, cell phones, watches, car and host of gadgets.

The prominent types of Cyber Crime such as :

FInancial Crimes, Cyber Pornography, Sale of Illegal Articles, Online gambling, Intellectual Property Crimes, Email Spoofing, Forgery, Cyber Defamation, Cyber stalking, Web defacement, Email bombing, Data diddling, DOS attack, Virus.Worm Attacks, Internet Time Theft, Web Jacking, Email Frauds, Cyber Terrorism.

Financial Crimes: include cyber cheating, credit card frauds, money laundering, hacking into bank servers, computer manipulation, accounting scams etc.

Cyber POrnography: It covers pornographic websites, pornographic magazines produced using the computer and the internet to download and transmit pornographic pictures, photos, writings etc.

Sales of Illegal Articles: Cases where the sales of illegal articles such as narcotics drugs, weapons, wildlife etc is being facilitated by the internet, Information about the availability of the product fro the sale is being posted on auction websitesm, bullitien boards etc.

Online gambling: Websites offering online gambling. It is legal in some countries. But when a person residing in a foreign country like india(where such websote is illegal) gamles is a legal issue.

Intellectual Property Crimes: These includes software piracy, copyright infringement, trademarks violations, theft of computer source codes etc.

Email Spoofing: A spoofed email is the one that appear to originate from one source but actually has been sent from another source.

Forgery: Counterfit currency notes, postage and revenue stamps, mark sheets ,academic certificate, etc are made by criminals using sophisticated computer , printers and scanners.

Cyber defamation: It takes place with the help of computer and or internet. The information published in the website or email sent to defame targetting an individual or an organisation.

Cyber stalking: It refers to use of the internet, email , or other electronics communications devices to stalk another person. Stalking invloves harassing, or threatening behaviour that an individual is engaged in repeatedly. Stalking laws requires that the perpetrator make a credible threat of violence against the victim; other includes threat against the victim’s immediate family.

Email Bombing: It refers to sending a large number of emails to the victim resulting in the victims email account or mail server to crashing. It is a type of DOS attack in which flood of information requests is sent to a server, bringing the system to knees and making the server difficult to access.

Data diddling: It is a illegal or unauthorised data alteration. These changes can occur before and during data input or before output.It has affected banks, payrolls, inventory records, credit records, school trnascripts and virtually all other form of data processing know.

Salami Attack: These attacks are used for committing financial crimes. The key here is to make alteration so insignifacant that in a single case it would go completely unnoticed. The attack is called salami attack as it is analogous to slicing the data thinly ,like a salami. For instance the bank employee inserts a program into the bank server that detects a small amount (Rs.2 a month) from the account of every customer. No account holder will probably notice this unauthorised debit, but the bank employee make a sizeable amount of money.

Denial of Service Attack: DOS Attack involve flooding a computer with more request that it can handle. This causes the computer to crash and result in authorized users being unable to access the service offered by the computer. In Distributed Denial of service attack (DDoS) wherin the perpetrators are many and are geographically widespread.

Virus/Worm Attack: Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on the victims computer, use the victims email program to spread itself to other computers, or even erase everything on the victim’s hard disk. Viruses are easily spread through email attachement or instant messages. Viruses can be disguised as attachments of
funny images, greeting cards, or audio and video files.
Worms unlike the viruses do not need the host to attach themselves. They merely make functional copies of themselves and do this repeatedly till they bring the system or a application to halt.

Trojans and Keyloggers: A Trojan is a unauthorized program which functions from inside what seems to be an authorised program, theryby concealing what it is actually doing. It performs undisclosed malicious functions that allow unauthorized access to the host machine, giving them the ability to save files on the users computer or even watch the users screen and control the computer.
Keyloggers: They are regularly used were to log all the strokes a victim makes on the keyboard. They are most commonly found in public computer such as cyber cafe, hotels etc.

Internet Time theft: This connotes the usage by an unauthorized person of the internet hours paid for by another person.

Web jacking: Web Jacking means forcefully taking over the control of the website (by cracking the password and later changing it). The actual owner of the website does not have any more control over what appears on the website.
There are many ways in which a hacker may get to know a password, the most common being the password cracking wherin the cracking software is used to guess a password. Password cracking attacks are most commonly of two types: The dictionary attack where the software will attempt all the word contained in a predefined dictionary of words. The other form is using the ‘Brute Force’. In this attack the software tries to guess the password by trying all possible combination of numbers, symbols, letters till the correct password is found.

Email frauds: or Phishing or Brand spoofing as it is called used fraudulent email messages and websites that look like they are from a legitimate company such as bank, credit card company, online retailer or government agencies. The Email you receive may look real with the company logos and branding but you may actually receive the spam or mass email from criminal.

Computer Terrorism: (Defination by Asian School of cyber Law) Cyber terrorism is the premediated use of disruptive activities or theĀ  threat thereof, in cyber space, with the intention to further social, ideological , religious, political or similar objectivies, or to intimidate any person in furtherance of such activities.

The information is with reference to the website:


Posted in Cyber Crime, Cyber Law | Tagged: , , , , , , , , , , , , , , , , , | Leave a Comment »