Thursday, August 22, 2013

Types of Cybercrime



Types of Cybercrime
Source: tothetick
In today's technology driven life, Internet is a vital part of our everyday activities, whenever we're using Internet, we're entering the "cyberworld", unfortunately the cyberspace is never been a safe place especially to the usual users. The following are some of the crimes that exist in cyberworld.

Identity Theft
Identity Theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if they are held accountable for the perpetrator's actions. Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.

Source: Wikipedia

Internet Fraud
Internet Fraud refers to the use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them, for example by stealing personal information, which can even lead to identity theft. A very common form of Internet fraud is the distribution of rogue security software. Internet services can be used to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.

Internet fraud can occur in chat rooms, email, message boards, or on websites.
Source: Wikipedia

Violation of Copyright Law through File Sharing
File Sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multimedia (audio, images and video), documents, or electronic books. It may be implemented through a variety of ways. Common methods of storage, transmission and dispersion include manual sharing utilizing removable media, centralized servers on networks, World-based hyperlinked documents, and the use of distributed peer-to-peer networking.
Source: Wikipedia

Hacking
Hacking means finding out weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker, not making a difference between computer criminals (black hats) and computer security experts (white hats). Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers.
Source: Wikipedia

Malwares and Viruses
A Computer Virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.

Malware includes computer viruses, computer wormsTrojan horses, most root kitsspyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to them. Some viruses do nothing beyond reproducing themselves.

An example of a virus which is not a malware, but is putatively benevolent, is Fred Cohen's compression virus. However, antivirus professionals do not accept the concept of benevolent viruses, as any desired function can be implemented without involving a virus (automatic compression, for instance, is available under the Windows operating system at the choice of the user). Any virus will by definition make unauthorised changes to a computer, which is undesirable even if no damage is done or intended. On page one of Dr Solomon's Virus Encyclopaedia, the undesirability of viruses, even those that do nothing but reproduce, is thoroughly explained.
Source: Wikipedia

i love you virus
Source: bbcimg
Most Devastating Computer viruses, malwares, and worms:

  1.     myDoom
  2.     SoBig
  3.     ILOVEYOU
  4.     Conficker
  5.     Code Red
  6.     Melissa
  7.     SirCam
  8.     SQLSlammer
  9.     Nimda
  10.     Sasser

Source: YahooNews

Denial of Service Attack
In computing, a denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.

Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root name servers. The term is generally used relating to computer networks, but is not limited to this field; for example, it is also used in reference to CPU resource management.

One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable. Such attacks usually lead to a server overload. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.

Denial-of-service attacks are considered violations of the IAB's Internet proper use policy, and also violate the acceptable use policies of virtually all Internet service providers. They also commonly constitute violations of the laws of individual nations.

When the DoS Attacker sends many packets of information and requests to a single network adapter, each computer in the network would experience effects from the DoS attack.
Source: Wikipedia

Spam
Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spamUsenet newsgroup spamWeb search engine spamspam in blogswiki spamonline classified ads spam, mobile phone messaging spamInternet forum spamjunk fax transmissionssocial networking spam, television advertising and file sharing network spam. It is named for Spam, a luncheon meat, by way of a Monty Python sketch in which Spam is included in almost every dish.

Spamming remains economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. In the year 2011, the estimated figure for spam messages is around seven trillion. The costs, such as lost productivity and fraud, are borne by the public and by Internet, which have been forced to add extra capacity to cope with the deluge. Spamming has been the subject of legislation in many jurisdictions. 

A person who creates electronic spam is called a spammer.
Source: Wikipedia

Child Pornography
Child pornography refers to images or films (also known as child abuse images) and, in some cases, writings depicting sexually explicit activities involving a child. Abuse of the child occurs during the sexual acts which are recorded in the production of child pornography and several professors of psychology state that memories of the abuse are maintained as long as visual records exist, are accessed, and are "exploited perversely.
Source: Wikipedia

Cyber Bullying
Cyberbullying is the use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner. As it has become more common in society, particularly among young people, legislation and awareness campaigns have arisen to combat it. 

Source: Wikipedia

Let me know your thoughts at the comment section. 

No comments:

Post a Comment

Popular Posts