Notes, Exercises, Videos, Tests and Things to Remember on Cyber Crime
Please scroll down to get to the study materials.
Anyone who wants to invade or harm a computer system can make use of the variety of tools and tricks. These tricks related to unauthorized access. The unauthorized access mechanism and other methods by which an intruder accesses the database are given in coming sections.
Computer Crime is an illegal activities carried out by the use of computers by the individuals who has a good knowledge about the computer. Alternatively, computer crime is also known ascyber crime, e-crime, electronic crimeor hi-tech crime.Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hackerthat illegally browses or steals a company's or individual's private information.
As the number of computer's users are increasing, the computer crime are also increasing. Due to the increment of computer crime, cyber law was made to control or minimize these crimes but the crimes has not be fully controlled by cyber law. Different types of computer crimes that has been in practice are as follows:
So, in simple words, we can define computer crime as the unethical or illegal acts like fraud, unauthorized access, phishing, identity theft, etc., done by the knowledgeable computer user by the use of computer.
The computers usually use some type of authentication technique using plain text passwords to protect the system from uninvited guests. But, some people can penetrate or break the authentication and access the computer resources. The activity can be carried out by the following methods:
Salami Saving and Data Diddling
Most of the computer crimes are generated from inside the job. In salami shaving, a programmer alters a program so that it subtracts a very small amount of money from each account and diverts the funds to the embezzler’s account.
In the case of Data Diddling, insiders modify data so that it is difficult to tell that they have stolen funds. In some cases, data diddling requires little more expertise than altering accounts or database records to disguise illegal activities.
Basic shortcomings in the Internet’s technical design enable knowledgeable users to make data appear to come from one place when it is really coming from another.
Pranksters can easily originate forged e-mail messages, which can do such things. Spammers (marketers who send unsolicited e-mail) use this technique to disguise the origin of their messages.
Security Loophole Detection Programs
There are some programs that can detect security loopholes. Intruders can use a variety of programs that automatically search for unprotected or poorly protected computer systems and notify them when a target is found.
They can also use SATAN, a security loophole analysis program designed for use by system administrators. The program can tell how to get into a poorly secured system.
Computer Viruses resemble a living virus in frightening ways. The computer viruses require a host and they are designed to make copies of themselves. There are varieties of viruses like file infector virus, boot sector virus, macro virus, time bombs, logic bombs, Trojan horse, etc.
Hackers, Crackers, Cyber Gangs and Virus Author
Hackers are computer hobbyists who enjoy pushing computer system to their limits. They experiment with a program to try to discover undocumented features, capabilities that are not mentioned in the system’s manuals. Sometimes, they try track down all the weaknesses and loopholes in a system’s security.
Hackers are those individuals who are technically proficient and attempted to access to any system in unauthorized ways. They are also known as ' Ethical Hackers' or 'White Hat Hackers'. So, hackers are those individuals who are technically proficient andare intensely interested in exploring the things and recondite workings of any computer operating system by discovering the holes within the system but never intentionally damage data.Hackers are most often programmers and they obtain advanced knowledge of operating systems and programming languages.
Crackers (also called black hats) are hackers who like Darth Vader in George Luca’s Star Wars trilogy, have turned to the dark side. They become obsessed with gaining entry to highly secure computer systems.
Crackers, who are also known as 'black hat', are those individuals who breaks into any system or violates the system integrity with malicious content. Having gained unauthorized access, crackers destroy vital data, deny legitimate users service or cause problems for their targets. Crackers can easily be identified because their actions are malicious.
Cyber Gangs brings crackers together by means of the Internet and physical meetings. The group dynamics reinforce their immature and often destructive aims.
Computer virus authors typically want to see how far they can push the boundaries of virus software.
Breaches of computer security can be costly. As our entire economy and infrastructure move to the networked information systems, the potential costs grow higher every day due to the breaches of computer security.
The following are the consequences due to an attempt in the computer crime caused by hackers, intruders, crackers, and viruses.
We are going to discuss some methods of protecting our computer from above mentioned possible damages to the computer and databases. None of them are 100% safe but they will definitely reduce the risk damage.
The following are the safety measures of computers.
Most of the computer systems use some type of authentication technique. They may be plaintext passwords which help to protect the system from uninvited guests. It isn’t difficult, though, to guess or obtain a password. In fact, many unauthorized access attempts target password lists.
Plagiarism is a serious offense. It is the presentations of somebody else work as it were your own. Plagiarism may cause legal problems. Plagiarizing copyrighted material is called copyright infringement.
If you are tempted to copy anything from the Web, you need to bear in mind that there are U.S is a signatory to international copyright regulations.
Hence, an author’s does not need to include an explicit copyright notice to be protected under the law. Don’t copy anything from the Web page without first asking permission.
Imagine that you have copied a computer program. It works perfectly on your friend’s computer. Maybe, you are interested in making money by selling it. Such actions which violate the copyright law is known as software piracy. There are some sites and some domains available for the free copy of software and trial versions to use.
But, you are restricted to use the full version of commercial software, which if you use and sell will affect the author directly or indirectly. The following actions are illegal:
Adult sites and obscenity
Adult sites are those sites which contain pornography. They are full of nude pictures and explicitly sexual outrages. Some people access these sites during the office hours which is hampers the regular work of the office.
Khanal, R.C. Khanal, R.C. Computer Concept for XII. Pashupatigriha Marga, Thapathali, Kathmandu, Nepal: Ekta Books Distributors Pvt. Ltd., 2010. 103-107.
Adhikari, Deepak Kumar.,et.al., Computer Science XII,Asia Publication Pvt.Ltd