Introduction to CYber Crime

Only available on StudyMode
  • Download(s) : 152
  • Published : March 25, 2014
Open Document
Text Preview
CYBER CRIME IN ITS VARIOUS FORMS
kimmyarora33@gmail.com

Abstract: This Paper is a review paper on the topic of Cybercrime and its forms. The paper describes very basic information about cybercrime. It includes introduction to cyber crime, its brief history, its types along with their brief description, today’s scenario regarding cybercrime and an introduction to cyber security as a weapon against cybercrime . The paper is best suited for those who want to understand what cybercrime exactly is at the beginners’ level and what are the prevailing cybercrimes. Keywords: Cybercrime, cyber security, Hacking, spoofing, Cyber stalking, DOS Attack, Computer Vandalism, Cyber terrorism, Softaware Piracy, Phishing, Data diddling, Virus/ Worms, Trojan ,Cyber Laundering, Cyber contraband. Introduction: Today , the world is moving towards a point where everything from banking, stock exchanges, traffic control, telephones to electric power, health care, welfare and education depends on software. Undoubtedly, this advancement and globalization offers many benefits to consumers and businesses but, unfortunately it also offers plenty of opportunities to organized crime. Globalization has promoted and strengthened the economics of illegal activities; offenders have become international entrepreneurs. The Internet provides money and information to all sorts of customers and businesses. It is notably the home of virtual worlds and their economies, which have attracted many people, including criminals. The unholy marriage of the Internet and crime has created a new form of crime -“CYBERCRIME” What is Cyber Crime?

Cyber Crime is an unlawful act commited using a computer (and/or internet), where it can be either a tool or a target or both. It can also be defined as any unethical activity facilitated by or commited with computer and information technologies. Some very amateur aspects of cyber crime are:

Using a computer and the internet to steal a person's identity or illegal imports or malicious programs comes under the ambit of cyber crime. India Cyber crimes can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and mischief. Spam e-mails and s-mail spoofing and phishing.

Spanning borders and taking multiple forms, cybercrime poses new challenges that endanger citizens, our collective security, and the economy of every nation on the planet. Brief History of Cyber Crime:

The first recorded cyber crime took place in the year 1820 although it is the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage . The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network),. The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk cloner . Categorizing Cyber Crime:

We can categorize Cyber crimes in two ways

The Computer as a Target :-using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc.
The computer as a weapon :-using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.

Various Cyber Crimes:
HACKING: Hacking in simple terms means an illegal intrusion into a computer system and/or network. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motives Behind hacking: Greed, Power, Publicity, Revenge, Adventure, Desire to access forbidden information, Destructive mindset, wants to sell n/w security services.

CYBER STALKING: Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. Moreover, cyber-stalking refers...
tracking img