Sei sulla pagina 1di 17

Computer crime refers to any crime that

involves a computer and a network,


where the computers may or may not
have played an instrumental part in the
commission of the crime (Moore 2000).
Netcrime refers, more precisely, to
criminal exploitation of the Internet .
Issues surrounding this type of crime
have become high-profile, particularly
those surrounding hacking, copyright
infringement, child porn, and child
grooming. There are also problems of
privacy when confidential information is
lost
intercepted,
lawfully
or
Onor
the
global level,
both governments
and non-state actors
otherwise.
continue to grow in importance, with the ability to engage
in such activities as espionage, financial theft, and other
cross-border crimes sometimes referred to as cyber
warfare. The international legal system is attempting to
hold actors accountable for their actions, with the
International Criminal Court among the few addressing this
threat

Summary :

Cyber Crimes in
Practice:

FRAUD

SPAM

OBSCENE OR
OFFENSIVE
CONTENT

DRUG
TRAFFICKING

HACKING

HARASSMENT

CYBER
WARFARE

CYBERTERRORIS
M

SPAM :
Spam, or the
unsolicited sending of
bulk email for
commercial purposes,
is unlawful to varying
degrees. As applied to
email, specific antispam laws are
relatively new,
however limits on
unsolicited electronic
communications have
existed in some forms
for some time.

FRAUD :
Computer fraud is any dishonest misrepresentation of fact
intended to let another to do or refrain from doing
something which causes loss.[citation needed] In this
context, the fraud will result in obtaining a benefit by:
altering computer input in an unauthorized way. This
requires little technical expertise and is not an uncommon
form of theft by employees altering the data before entry or
entering false data, or by entering unauthorized instructions
or using unauthorized processes;
altering, destroying, suppressing, or stealing output, usually
to conceal unauthorized transactions: this is difficult to
detect;
altering or deleting stored data;
altering or misusing existing system tools or software
packages, or altering or writing code for fraudulent
purposes. This requires real programming skills and is not
common.
Other forms of fraud may be facilitated using computer
systems, including bank fraud, identity theft, extortion, and

OBSCENE OR OFFENSIVE CONTENT :


The content of websites and other electronic
communications may be distasteful, obscene or offensive
for a variety of reasons. In some instances these
communications may be illegal.
Many jurisdictions place limits on certain speech and ban
racist, blasphemous, politically subversive, libelous or
slanderous, seditious, or inflammatory material that tends
to incite hate crimes.
The extent to which these communications are unlawful
varies greatly between countries, and even within nations.
It is a sensitive area in which the courts can become
involved in arbitrating between groups with entrenched
beliefs.
One area of Internet pornography that has been the target

HARASSMENT:
Whereas content may be
offensive in a non-specific way,
harassment directs obscenities
and derogatory comments at
specific individuals focusing for
example on gender, race,
religion, nationality, sexual
orientation. This often occurs in
chat rooms, through
newsgroups, and by sending
hate e-mail to interested parties
(see cyber bullying, cyber
stalking, harassment by
computer, hate crime, Online
predator, and stalking). Any
comment that may be found
derogatory or offensive is
considered harassment.

DRUG TRAFFICKING:
Drug traffickers are increasingly taking advantage of
the Internet to sell their illegal substances through
encrypted e-mail and other Internet Technology.
[citation needed] Some drug traffickers arrange
deals at internet cafes, use courier Web sites to
track illegal packages of pills, and swap recipes for
amphetamines in restricted-access chat rooms.
The rise in Internet drug trades could also be
attributed to the lack of face-to-face
communication. These virtual exchanges allow more
intimidated individuals to more comfortably
purchase illegal drugs. The sketchy effects that are
often associated with drug trades are severely
minimized and the filtering process that comes with
physical interaction fades away. Furthermore,
traditional drug recipes were carefully kept secrets.
But with modern computer technology, this

CYBERTERRORISM:
Government officials and Information Technology security
specialists have documented a significant increase in
Internet problems and server scans since early 2001. But
there is a growing concern among federal officials [who?]
that such intrusions are part of an organized effort by
cyberterrorists, foreign intelligence services, or other
groups to map potential security holes in critical systems.
A cyberterrorist is someone who intimidates or coerces a
government or organization to advance his or her political
or social objectives by launching computer-based attack
against computers, network, and the information stored on
them.
Cyberterrorism in general, can be defined as an act of
terrorism committed through the use of cyberspace or
computer resources (Parker 1983). As such, a simple
propaganda in the Internet, that there will be bomb attacks
during the holidays can be considered cyberterrorism. At
worst, cyberterrorists may use the Internet or computer
resources to carry out an actual attack. As well there are
also hacking activities directed towards individuals,

CYBER WARFARE :
The U.S. Department of Defense (DoD) notes
that cyberspace has emerged as a nationallevel concern through several recent events of
geo-strategic significance. Among those are
included the attack on Estonia's infrastructure in
2007, allegedly by Russian hackers. "In August
2008, Russia again allegedly conducted cyber
attacks, this time in a coordinated and
synchronized kinetic and non-kinetic campaign
against the country of Georgia. Fearing that
such attacks may become the norm in future
warfare among nation-states, the concept of
cyberspace operations impacts and will be
adapted by warfighting military commanders in
the future.

HACKING

Computer security hacking where


someone attempts to defeat or
exploit the security capabilities of a
computer system.

COMPUTER VIRUS :

A computer virus is a computer


program that can copy itself and
infect a computer without
permission or knowledge of the
user. The term "virus" is also
commonly used, albeit erroneously,
to refer to many different types of
malware and adware programs. The
original virus may modify the
copies, or the copies may modify
themselves, as occurs in a
metamorphic virus. A virus can only
spread from one computer to

CRYPTOGRAPHY :
In modern times, cryptography is considered a branch of
both mathematics and computer science, and is affiliated
closely with information theory, computer security, and
engineering. Cryptography is used in applications present
in technologically advanced societies; examples include the
security of ATM cards, computer passwords, and electronic
Until
modern
times,
referred almost
commerce,
which
allcryptography
depend on cryptography.
exclusively to encryption, the process of converting
ordinary information (plaintext) into unintelligible
gibberish(cipher text).
Decryption is the reverse, moving from
unintelligible ciphertext to plaintext. A cipher (or
cypher) is a pair of algorithms which creates the
encryption and the reversing decryption.
The study of characteristics of languages which
have some application in cryptology, i.e. frequency
data, letter combinations, universal patterns, etc. is
called Crypto linguistics.

Reported cyber crime cases :


The Newscorp satellite pay to view
encrypted SKY-TV service was hacked
several times between 1995 and 1998
during an on-going technological arms
race between a pan-European hacking
group and Newscorp. The original
motivation of the hackers was to watch
Star Trek re-runs in Germany; which was
The Yahoo! website was attacked at
something which Newscorp did not have
10:30 PST on Monday, 7 February 2000.
the copyright to allow.
The attack, started by MafiaBoy, lasted for
three hours. Yahoo was pinged at the rate
of one gigabyte/second.
About fifty computers at Stanford
University, and also computers at the
University of California at Santa
Barbara, were amongst the zombie
computers sending pings in DDoS
attacks.

Reported cyber crime cases :


On 3 August 2000, Canadian federal
prosecutors charged MafiaBoy with 54
counts of illegal access to computers, plus
a total of ten counts of mischief to data for
his attacks on Amazon.com, eBay, Dell
Computer, Outlaw.net, and Yahoo.
MafiaBoy had also attacked other
websites, but prosecutors decided that a
On 2 March 2010, Spanish investigators
total of 66 counts was enough. MafiaBoy
busted 3 in infection of over 13 million
pleaded not guilty.
computers around the world. The "botnet"
of infected computers included PCs inside
more than half of the Fortune 1,000
companies and more than 40 major banks,
In 26 March 1999, the Melissa worm
according to investigators.
infected a document on a victim's
computer, then automatically sent that
document and copy of the virus via e-mail
to other people.

BASIC SECURITY MEASURES :


Antivirus software :
Many users install anti-virus software that
can detect and eliminate known viruses
after the computer downloads or runs the
executable.The most common method of
virus detection is using a list of virus
signature definitions.The second method
is to use a heuristic algorithm to find
viruses based on common behaviours.
This method has the ability to detect
Recovery
Methods :security firms have
viruses
that anti-virus
Oneapossibility
yet to create
signatureon
for.Windows Me, Windows XP and
Windows Vista is a tool known as System Restore, which
restores the registry and critical system files to a previous
checkpoint.
Operating system reinstallation :
Reinstalling the operating system is another approach
to virus removal. It involves simply reformatting the OS
partition and installing the OS from its original media, or
imaging the partition with a clean backup image.

References :
Mann and Sutton 1998: >>Netcrime: More change in the
Organization of Thieving. British Journal of Criminology;
38:201229.http://bjc.oxfordjournals.org/cgi/content/abstract/
38/2/201.
http://www.wikipedia.org
http://encylopedia.org
Pictures taken from http://www.google.co.in
Ophardt, Jonathan A. "CYBER WARFARE AND THE CRIME OF
AGGRESSION: THE NEED FOR INDIVIDUAL ACCOUNTABILITY
ON TOMORROWS BATTLEFIELD" Duke Law and Technology
Review, Feb. 23, 2010

THANK
YOU

Potrebbero piacerti anche