Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ABSTRACT
This paper explores the fast growing Cyberworld TECHNICAL ASPECTS
and its components. It starts with definitions of
who is the hacker, and what is a cybercrime. Types Technological advancements have created new
and offenses of cybercrime are addressed as well. possibilities for criminal activity, in particular the
The paper concentrates on the possibilities to criminal misuse of information technologies such
protect ourselves from the cybercrime, and guard as:
Cyberworld from us. Therefore, it emphasizes the
importance of users' education, starting from the 1. Unauthorized access & Hacking :- Access
early age, creation and enforcement of policies, means gaining entry into, instructing or
and awareness training. The paper presents laws, communicating with the logical, arithmetical, or
applicable to the computer related crime. memory function resources of a computer,
computer system or computer network.
INTRODUCTION Unauthorized access would therefore mean any
Any use of a computer as an instrument to further kind of access without the permission of either the
illegal ends, such as committing fraud, trafficking rightful owner or the person in charge of a
in child pornography and intellectual property, computer, computer system or computer network.
stealing identities, or violating privacy. Every act committed towards breaking into a
Cybercrime, especially through the Internet, has computer and/or network is hacking. Hackers write
grown in importance as the computer has become or use ready-made computer programs to attack the
central to commerce, entertainment, and target computer. They possess the desire to destruct
government. The international nature of and they get the kick out of such destruction. Some
cybercrimes has led to international cyberlaws.The hackers hack for personal monetary gains, such as
following is a selection of items (artistic styles or to stealing the credit card information, transferring
groups, constructions, events, fictional characters, money from various bank accounts to their own
organizations, publications) associated with account followed by withdrawal of money. By
"cybercrime" hacking web server taking control on another
1. Malware persons website called as web hijacking
2. Trojan horse
3. Phishing 2.Trojan Attack:- The program that act like
4. Spyware something useful but do the things that are quiet
5. Hacking damping. The programs of this kind are called as
Cyber crimes can involve criminal activities that Trojans. The name Trojan Horse is popular.
are traditional in nature, such as theft, fraud, Trojans come in two parts, a Client part and a
forgery, defamation and mischief, all of which are Server part. When the victim (unknowingly) runs
subject to the Indian Penal Code. The abuse of the server on its machine, the attacker will then use
computers has also given birth to a gamut of new the Client to connect to the Server and start using
age crimes that are addressed by the Information the trojan. TCP/IP protocol is the usual protocol
Technology Act, 2000. type used for communications, but some functions
We can categorize Cyber crimes in two ways of the trojans use the UDP protocol as well.
1. The Computer as a Target :-using a
computer to attack other computers. e.g. 3. Virus and Worm attack:- A program that has
Hacking, Virus/Worm attacks, DOS attack capability to infect other programs and make copies
etc. of itself and spread into other programs is called
2. The computer as a weapon :-using a virus. Programs that multiply like viruses but
computer to commit real world crimes. spread from computer to computer are called as
E.g. Cyber Terrorism, IPR violations, worms.
Credit card frauds, EFT frauds,
Pornography etc.
4. Pornography:- The literal mining of the term is a greater emphasis on back-office systems
'Pornography' is “describing or showing sexual acts designed to spot fraudulent activities associated
in order to cause sexual excitement through books, with advanced malware operating on customers'
films, etc.” This would include pornographic computers.
websites; pornographic material produced using
computers and use of internet to download and
transmit pornographic videos, pictures, photos, HISTORY OF HACKING
writings etc. Adult entertainment is largest industry The story of hacking actually goes back to the
on internet.There are more than 420 million 1950s, when a group of phreaks (short for “phone
individual pornographic webpages today. Research freaks”) began to hijack portions of the world’s
shows that 50% of the web-sites containing telephone networks, making unauthorized long-
potentially illegal contents relating to child abuse distance calls and setting up special “party lines”
were ‘Pay-Per-View’. This indicates that abusive for fellow phreaks. With the proliferation of
images of children over Internet have been highly computer bulletin board systems (BBSs) in the late
commercialized. Pornography delivered over 1970s, the informal phreaking culture began to
mobile phones is now a burgeoning business, coalesce into quasi-organized groups of individuals
“driven by the increase in sophisticated services who graduated from the telephone network to
that deliver video clips and streaming video, in “hacking” corporate and government computer
addition to text and images.” network systems.