Sei sulla pagina 1di 4

CYBER CRIME & HACKING

HATIM NAGARWALA RAMCHANDRA BHATE


Computer Science and engineering, Vishwabharati Computer Science and engineering, Vishwabharati
Academy’s College of Engineering, Ahmednagar, Academy’s College of Engineering, Ahmednagar,
Email : hatim.nagarwala@yahoo.in Email : ramchandra_bhate@yahoo.com

ABSTRACT
This paper explores the fast growing Cyberworld TECHNICAL ASPECTS
and its components. It starts with definitions of
who is the hacker, and what is a cybercrime. Types Technological advancements have created new
and offenses of cybercrime are addressed as well. possibilities for criminal activity, in particular the
The paper concentrates on the possibilities to criminal misuse of information technologies such
protect ourselves from the cybercrime, and guard as:
Cyberworld from us. Therefore, it emphasizes the
importance of users' education, starting from the 1. Unauthorized access & Hacking :- Access
early age, creation and enforcement of policies, means gaining entry into, instructing or
and awareness training. The paper presents laws, communicating with the logical, arithmetical, or
applicable to the computer related crime. memory function resources of a computer,
computer system or computer network.
INTRODUCTION Unauthorized access would therefore mean any
Any use of a computer as an instrument to further kind of access without the permission of either the
illegal ends, such as committing fraud, trafficking rightful owner or the person in charge of a
in child pornography and intellectual property, computer, computer system or computer network.
stealing identities, or violating privacy. Every act committed towards breaking into a
Cybercrime, especially through the Internet, has computer and/or network is hacking. Hackers write
grown in importance as the computer has become or use ready-made computer programs to attack the
central to commerce, entertainment, and target computer. They possess the desire to destruct
government. The international nature of and they get the kick out of such destruction. Some
cybercrimes has led to international cyberlaws.The hackers hack for personal monetary gains, such as
following is a selection of items (artistic styles or to stealing the credit card information, transferring
groups, constructions, events, fictional characters, money from various bank accounts to their own
organizations, publications) associated with account followed by withdrawal of money. By
"cybercrime" hacking web server taking control on another
1. Malware persons website called as web hijacking
2. Trojan horse
3. Phishing 2.Trojan Attack:- The program that act like
4. Spyware something useful but do the things that are quiet
5. Hacking damping. The programs of this kind are called as
Cyber crimes can involve criminal activities that Trojans. The name Trojan Horse is popular.
are traditional in nature, such as theft, fraud, Trojans come in two parts, a Client part and a
forgery, defamation and mischief, all of which are Server part. When the victim (unknowingly) runs
subject to the Indian Penal Code. The abuse of the server on its machine, the attacker will then use
computers has also given birth to a gamut of new the Client to connect to the Server and start using
age crimes that are addressed by the Information the trojan. TCP/IP protocol is the usual protocol
Technology Act, 2000. type used for communications, but some functions
We can categorize Cyber crimes in two ways of the trojans use the UDP protocol as well.
1. The Computer as a Target :-using a
computer to attack other computers. e.g. 3. Virus and Worm attack:- A program that has
Hacking, Virus/Worm attacks, DOS attack capability to infect other programs and make copies
etc. of itself and spread into other programs is called
2. The computer as a weapon :-using a virus. Programs that multiply like viruses but
computer to commit real world crimes. spread from computer to computer are called as
E.g. Cyber Terrorism, IPR violations, worms.
Credit card frauds, EFT frauds,
Pornography etc.
4. Pornography:- The literal mining of the term is a greater emphasis on back-office systems
'Pornography' is “describing or showing sexual acts designed to spot fraudulent activities associated
in order to cause sexual excitement through books, with advanced malware operating on customers'
films, etc.” This would include pornographic computers.
websites; pornographic material produced using
computers and use of internet to download and
transmit pornographic videos, pictures, photos, HISTORY OF HACKING
writings etc. Adult entertainment is largest industry The story of hacking actually goes back to the
on internet.There are more than 420 million 1950s, when a group of phreaks (short for “phone
individual pornographic webpages today. Research freaks”) began to hijack portions of the world’s
shows that 50% of the web-sites containing telephone networks, making unauthorized long-
potentially illegal contents relating to child abuse distance calls and setting up special “party lines”
were ‘Pay-Per-View’. This indicates that abusive for fellow phreaks. With the proliferation of
images of children over Internet have been highly computer bulletin board systems (BBSs) in the late
commercialized. Pornography delivered over 1970s, the informal phreaking culture began to
mobile phones is now a burgeoning business, coalesce into quasi-organized groups of individuals
“driven by the increase in sophisticated services who graduated from the telephone network to
that deliver video clips and streaming video, in “hacking” corporate and government computer
addition to text and images.” network systems.

5. Malware : Malware, short for malicious HACKING


software, is software designed to infiltrate a In the broadest terms hacking is just a slang
computer system without the owner's informed expression for people that try to figure stuff out.
consent. The expression is a general term used by For example, your microwave breaks down, so you
computer professionals to mean a variety of forms buy a new one - but instead of throwing the old one
of hostile, intrusive, or annoying software or out, you take it apart and look at the parts for
program code. The term "computer virus" is interest sake to see if you can understand how it
sometimes used as a catch-all phrase to include all worked. In computer terms, hacking can be used
types of malware, including true viruses. Software in a mild way to describe simple looking for ways
is considered malware based on the perceived to see things - like hidden code on a page, or it can
intent of the creator rather than any particular be used for strong meaning like a series of specific
features. Malware includes computer viruses, actions done to allow someone to access a
worms, trojan horses, most rootkits, spyware, password protected situation.
dishonest adware, crimeware and other malicious While breaching privacy to detect cybercrime
and unwanted software. In law, malware is works well when the crimes involve the theft and
sometimes known as a computer contaminant, for misuse of information, ranging from credit card
instance in the legal codes of several U. S. states, numbers and personal data to file sharing of
including California and West Virginia. Malware is various commodities—music, video, or child
not the same as defective software, that is, software pornography.
that has a legitimate purpose but contains harmful
bugs. Preliminary results from Symantec published Hacking mainly seen in developed cities. The main
in 2008 suggested that "the release rate of system of the city can be hacked and the control
malicious code and other unwanted programs may can be taken away by the hackers. This may create
be exceeding that of legitimate software a very severe effect on every aspect of a city and
applications." According to F-Secure, "As much can also destroy the city. As narrated in the Movie
malware [was] produced in 2007 as in the previous Die-hard 4.0 is the best example of the above threat
20 years altogether." Malware's most common which can create a big cyber crime.
pathway from criminals to users is through the
Internet: primarily by e-mail and the World Wide THREATS OF HACKING
Web. The prevalence of malware as a vehicle for
organized Internet crime, along with the general Most emails on the Internet are sent in the
inability of traditional anti-malware protection plaintext from and hence can easily be recorded
platforms to protect against the continuous stream and spied with the help of a sniffer. This email not
of unique and newly produced professional only puts the personal conversations at risk, but
malware, has seen the adoption of a new mindset even the sensitive business deals can be violated
for businesses operating on the Internet - the with the help of sniffer tools. Its very easy for an
acknowledgment that some sizable percentage of attacker to send out abusive E-mails to the victim
Internet customers will always be infected for some and remain completely anonymous at the same
reason or other, and that they need to continue time.
doing business with infected customers. The result
Another common problem with e-mail clients is them more secure. This is the only proven
that while a user is being authenticated the method of greatly hardening your systems
username and password pair is sent in plaintext to from attack. If you don’t identify
the mail server. This makes it very easy for an weaknesses, it’s a matter of time before
attacker to use a sniffer to sniff the password of a the vulnerabilities are exploited. As
victim and carry out malicious activities. Attackers hackers expand their knowledge, so should
commonly use e-mail to carry out social you. You must think like them to protect
engineering attacks both human and computer your systems from them. You, as the
based. Spam has become an extremely big problem ethical hacker, must know activities
hackers carry out and how to stop their
for all e-mail users. A recent report revealed that
efforts. You should know what to look for
spam contributed more than 70% of all e-mail on
and how to use that information to thwart
the internet. Spam e-mails not only clutters up your hackers’ efforts. You don’t have to protect
inbox, but it also leads to a waste of time and your systems from everything. You can’t.
resources in the storing and reading of useless The only protection against everything is
information. to unplug your computer systems and lock
them away so no one can touch them —
NEED FOR ETHICAL HACKING not even you. That’s not the best approach
to information security. What’s important
Due to the threat and insecurity from the illegal is to protect your systems from known
hackers need to be stopped. So a new concept of vulnerabilities and common hacker
ethical hacking has been introduced. The ethical attacks. It’s impossible to buttress all
hacking works as a security agency which provides possible vulnerabilities on all your systems.
security according to the needs. Ethical hacking is a You can’t plan for all possible attacks
legal hacking process to prevent the cyber crime. especially the ones that are currently
To catch a thief, think like a thief. That’s the basis unknown. However, the more combinations
for ethical hacking. The law of averages works you try the more you test whole systems
against security. With the increased numbers and instead of individual units the better your
expanding knowledge of hackers combined with chances of discovering vulnerabilities that
the growing number of system vulnerabilities and affect everything as a whole. Don’t take
ethical hacking too far, though. It makes
other unknowns, the time will come when all
little sense to harden your systems from
computer systems are hacked or compromised in
unlikely attacks. For instance, if you don’t
some way. Protecting your systems from the bad have a lot of foot traffic in your office and
guys — and not just the generic vulnerabilities that no internal Web server running, you may
everyone knows about — is absolutely critical. not have as much to worry about as an
Internet hosting provider would have.
ETHICAL HACKING However, don’t forget about insider threats
from malicious employees!
Ethical hacking also known as penetration testing
or white-hat hacking involves the same tools, CONCLUSION
tricks, and techniques that hackers use, but with
one major difference: Ethical hacking is legal. Hacking can be used in either of the two ways
Ethical hacking is performed with the target’s In a good use to help the government for the
permission. The intent of ethical hacking is to betterment of the people or it can also be a
discover vulnerabilities from a hacker’s viewpoint
major crime which can create a disaster. So its
so systems can be better secured. It’s part of an
overall information risk management program that
our responsibilities for using the concept of
allows for ongoing security improvements. Ethical hacking for the betterment of the society. For
hacking can also ensure that vendors’ claims about this ethical hacking concept has been
the security of their products are legitimate. introduced so that the white hat hackers can
create a lot advancements in the security
Hacking preys on weak security practices system of a country.
and undisclosed vulnerabilities.Firewalls,
encryption, and virtual private networks REFERENCES
(VPNs) can create a false
feeling of safety. These security systems
1. Foote D. (2002, March). Good Ethics at Work
often focus on high-level vulnerabilities,
Lie in the Hiring. Computerworld. Retrieved
such as viruses and traffic through a July23, 2004 from
firewall, without affecting how hackers http://www.computerworld_.com/printthis/200
work. Attacking your own systems to 2/0, 4814,68719,00.html
discover vulnerabilities is a step to making
2. Harvey B. (2004). Computer hacking and
ethics. University of California, Berkeley.
Retrieved July23, 2004 from
http://www.cs.berkeley.edu/~bh/hackers.html
3. Internet Stuff. (2004, May, 25). 2004 E-Crime
Watch Survey. Retrieved July23, 2004 from
http://www.cert.org/about/ecrime.html)
4. Internet Stuff. (2004). Threats and protection
by Homeland Security. Retrieved July23, 2004
from http://www.dhs.gov/dhspublic/display?
theme =30&content=3813
5. Internet stuff. (2004). What is cyber crime.
Retrieved July 23, 2004 from
http://www.cybercitizenship.org/crime/crime.h
tml
6. Khalid A. (2004, March 5). Cyber crime:
Business and the law on different pages. The
Star. Retrieved June 28, 2004 from
http://www.niser.org.my/news/2004_03_05_01
.html
7. Labuschagne L. (2000, July). Evaluation
criteria. Rand Afrikaans University. Retrieved
July23, 2004 from
http://csweb.rau.ac.za/staff/labuschagne/resear
ch/articles/eth_hac.pdf

Potrebbero piacerti anche