Anda di halaman 1dari 13

http://www.britannica.

com/EBchecked/topic/130595/cybercrime#toc235699
1) Introduction to Cybercrime Cybercrime definition and origins of the world, Cybercrime and information security, Classifications of cybercrime, Cybercrime and the Indian ITA 2000, A global Perspective on cybercrimes.

!"!# $0#

1) Cyberoffenses & Cybercrime %ow criminal plan the attac&s, 'ocial (ngg, Cyber stal&ing, Cybercafe and Cybercrimes, )otnets, Attac& vector, Cloud computing,Proliferation of *obile and +ireless ,evices, Trends in *obility, Credit Card -rauds in *obile and +ireless Computing (ra, 'ecurity Challenges Posed by *obile ,evices, .egistry 'ettings for *obile ,evices, Authentication 'ervice 'ecurity, Attac&s on *obile/Cell Phones, *obile ,evices0 'ecurity Implications for 1rgani2ations, 1rgani2ational *easures for %andling *obile, ,evices3.elated 'ecurity Issues, 1rgani2ational 'ecurity Policies and *easures in *obile Computing (ra, 4aptops !# $0# !# 2) Tools and Methods Used in Cyberline Pro5y 'ervers and Anonymi2ers, Phishing, Password Crac&ing, 6eyloggers and 'pywares, 7irus and +orms, 'teganography, ,o' ,,o' Attac&s, '84 In9ection, )uffer 1ver -low, Attac&s on +ireless :etwor&s, Phishing, Identity Theft I, Theft# !# $0# $0# !# 3) Cybercrimes and Cybersecurity: The Legal ers!ecti"es +hy do we need Cyberlaw0 The Indian Conte5t, The Indian IT Act, ,igital 'ignature and the Indian IT Act, Amendments to the Indian IT Act, Cybercrime and Punishment, Cyberlaw, Technology and 'tudents0 Indian 'cenario $0# #) Understanding Com!uter $orensics %istorical )ac&ground of Cyberforensics, ,igital -orensics 'cience, The :eed for Computer -orensics, Cyberforensics and ,igital (vidance, -orensics Analysis of (mail, ,igital -orensics 4ifecycle, Chain of Custody Concept, :etwor& -orensics, Approaching a Computer -orensics Investigation, 'etting of a Computer -orensics 4aboratory0 ;nderstanding the .e<uirements, Computer -orensics and 'teganography, .elevance of the 1'I = 4ayer *odel to the Computer -orensics and 'ocial :etwor&ing 'ites0 The 'ecurity/Privacy Threats, -orensics Auditing, Anti -orensics. $0# $0# %) Cybersecurity: &rgani'ational Im!lications Cost of Cybercrimes and IP. Issues04esson for 1rgani2ations, +eb Treats for 1rgani2ations0 The (vils and Perils, 'ecurity and Privacy Implications from Cloud Computing, 'ocial *edia *ar&eting0'ecurity .is& and Perils for 1rgani2ation, 'ocial Computing and the Associated Challenges for 1rgani2ations, Protecting People>s Privacy in the 1rgani2ation, 1rgani2ational ?uidelines for Internet ;sage, 'afe Computing ?uidelines and Computer ;sage Policy, Incident %andling0 An (ssential Component, Intellectual Property in the Cyberspace of Cybersecurity, Importance of (ndpoint 'ecurity in 1rgani2ations. $0#

(5

Who are the cybercriminals?


For today I want to expand your understanding of the term cybercriminal and let you know what you can do about it.

The stereotypical cybercriminal is running botnets, stealing bank accounts, hacking into major companies to steal trade secrets, and performing other nefarious high profile crimes that capture the fancy of major news organi!ations, but the problem is really far more insidious than most people reali!e.

cybercriminal, botnets , , , .

"et us take a look at a few cybercriminals whose types of crime may affect you or people you care about.

#ust about a year ago, $nthony %tacl recei&ed a '( year prison sentence. What was his cybercrime? $nthony was an ') year old high school student who tricked fellow students into sending him nude pictures while pretending to be a female. From there, %tacl threatened to expose the students if they did not perform sexual acts with him. *lackmail &ia the use of computers is a type of cybercrime that can affect many people.

, %tacl '( . ? ') . , %tacl .

+enneth +ranich is a gambling addict who turned to cybercrime to fund his addiction. What did +ranich do? +ranich ad&ertised computers for sale on e*ay, but then ne&er deli&ered them. In another case, #ustin ,astilyn allegedly sent a counterfeit money order for -',.(/ to buy &ideos from his &ictim who had ad&ertised the items for sale on ,raigslist. ,astilyn was also a suspect of interest in se&eral other internet scam complaints.

+ranich , . +ranich ? +ranich , . , ,astilyn ,raigslist , - '.(/ . ,astilyn .

%tacl, +ranich, and ,astilyn were all apprehended because &ictims contacted law enforcement.

The I,0 is the Internet ,rime ,omplaint ,enter and can be found at here. When you know or suspect you are a target of cybercrime, it is important to notify law enforcement. What else are the cybercrooks up to? In $ustralia there was the strange case of Tanya 1aree 2uattrocchi who was sentenced to jail for stalking and harassing 3and hacking4 an American Idol runner up, 5iana 5egarmo. 6ne of the stupidest cybercriminals of all time is ,hristopher #ac7uette, who along with some friends, hacked into college computers and changed failing grades to $s. This may at first glance seem like a &ictimless crime, howe&er it affects class placement and hence scholarship, postgraduate and employment opportunities for honest students. There are many types of cybercrime and the majority of these crimes, by number, are not the high profile attacks that generally make the news. In future blogs I will highlight some of these crimes and how to minimi!e your risk for falling &ictim to such crimes

I,0 . , .

,ybercrooks ? 5e8armo, 3 4 . #ac7uette , . , , &ictimless .

, .

Definition - What does Cybercriminal mean? A cybercriminal is an individual who commits cybercrimes, where he/she ma&es use of the computer either as a tool or as a target or as both. Cybercriminals use computers in three broad ways0

!e"ect comp#ter a$ their tar%et: &he$e crimina"$ attack other peop"e'$ comp#ter$ to per(orm ma"icio#$ acti)itie$* $#ch a$ $preadin% )ir#$e$* data the(t* identity the(t* etc. +$e$ comp#ter a$ their weapon: &hey #$e the comp#ter to carry o#t ,con)entiona" crime,* $#ch a$ $pam* (ra#d* i""e%a" %amb"in%* etc. +$e$ comp#ter a$ their acce$$ory: &hey #$e the comp#ter to $a)e $to"en or i""e%a" data.

Techopedia explains Cybercriminal


Cybercriminals often work in organized groups. Some cybercriminal roles are:

Programmers: Write code or programs used by cybercriminal organization Distributors: Distribute and sell stolen data and goods from associated cybercriminals IT experts: Maintain a cybercriminal organization's IT infrastructure, such as servers, encryption technologies and databases Hackers: Exploit systems, applications and network vulnerabilities Fraudsters: Create and deploy schemes like spam and phishing System hosts and providers: Host sites and servers that possess illegal contents Cashiers: Provide account names to cybercriminals and control drop accounts Money mules: Manage bank account wire transfers Tellers: Transfer and launder illegal money via digital and foreign exchange methods Leaders: Often connected to big bosses of large criminal organizations. Assemble and direct cybercriminal teams, and usually lack technical knowledge.

Clearly, there is much overlap between roles, but as cybercrime becomes a greater issue, more specialization is being seen as organized crime gets in the picture. For example, hackers were once more often than not hobbyists who broke into systems for personal gratification. While white-hat hacking hasn't disappeared, it's much more common now to see hackers as professionals who sell their services to the highest bidder. 99999999999999999999999999999999999999999999999999999999999999999999999

what are the key provisions in indian IT act 2000


History[edit]
The :nited ;ations 8eneral $ssembly by resolution $<=>%<('<'?@, dated the 0/ #anuary '..A has adopted the 1odel "aw on >lectronic ,ommerceadopted by the :nited ;ations ,ommission on International Trade "aw. This is referred to as the :;,IT=$" 1odel "aw on > ,ommerce. Following the :; =esolution India passed the Information Technology $ct @/// in 1ay @///, which came into force on 6ctober 'A, @///. The Information Technology $ct @/// has been substantially amended through the Information Technology 3$mendment4 $ct @//) which was passed by the two houses of the Indian Barliament on 5ecember @0, and @C, @//). It got the Bresidential assent on February (, @//. and came into force on 6ctober @A, @//..

Provisions[edit]
Information technology $ct @/// consisted of .C sections segregated into '0 chapters. Four schedules form part of the $ct. In the @//) &ersion of the $ct, there are '@C sections 3excluding ( sections that ha&e been omitted from the earlier &ersion4 and 'C chapters. %chedule I and II ha&e been replaced. %chedules III and ID are deleted. Information Technology $ct @/// addressed the following issuesE '. @. 0. "egal =ecognition of >lectronic 5ocuments "egal =ecognition of 5igital %ignatures 6ffenses and ,ontra&entions #ustice 5ispensation %ystems for ,ybercrimes

-.

The Information Technology (Amendment Act! 200"[edit]


The 8o&ernment of India has brought major amendments to IT$ @/// in form of the Information Technology $mendment $ct, @//). IT$$ @//) 3Information Technology $mendment $ct @//)4 as the new &ersion of Information Technology $ct @/// is often referred has pro&ided additional focus on Information %ecurity. It has added se&eral new sections on offences including ,yber Terrorism and 5ata Brotection. $ set of =ules relating to %ensiti&e Bersonal Information and =easonable %ecurity Bractices 3mentioned in section C0$ of the IT$$, @//)4 was released in $pril @/'' F'G

Criticisms[edit]
The amendment was passed in an e&entful Barliamentary session on @0rd of 5ecember @//) with no discussion in the House. %ome of the cyber law obser&ers ha&e critici!ed the amendments on the ground of lack of legal and procedural safeguards to pre&ent &iolation of ci&il liberties of Indians. There ha&e also been appreciation about the amendments from many obser&ers because it addresses the issue of ,yber %ecurity. %ection ?. empowers the ,entral 8o&ernment<%tate 8o&ernment< its authori!ed agency to intercept, monitor or decrypt any information generated, transmitted, recei&ed or stored in any computer resource if it is necessary or expedient so to do in the interest of the so&ereignty or integrity of India, defence of India, security of the %tate, friendly relations with foreign %tates or public order or for pre&enting incitement to the commission of any cogni!able offence or for in&estigation of any offence. They can also secure assistance from computer personnel in decrypting data 3seemandatory decryption4, under penalty of imprisonment.F@G %ection ??$ is widely critici!ed.F0G It has led to numerous abuses reported by the press.FCG %ection ??$ has also been criticised and challenged in "ucknow and 1adras High ,ourts for its constitutional &alidity. F(GF?G *ased on %ection ??$, *ombay High ,ourt has held that creating a website and storing false information on it can entail cyber crime.FAG

999999999999999999999999999999999999999999999999999999999999

Classification Of Cyber Crimes


$rticle *y Brashant 1ali It can be classified in to C major categories as (1) Cyber crime against Individual (2) Cyber crime Against Property ( ) Cyber crime Against Organi!ation (") Cyber crime Against #ociety (1) Against Individuals

(i) $mail spoofing % $ spoofed email is one in which e mail header is forged so that mail appears to originate from one source but actually has been sent from another source (ii) #pamming % %pamming means sending multiple copies of unsolicited mails or mass e mails such as chain letters. (iii) Cyber &efamation % This occurs when defamation takes place with the help of computers and < or the Internet. >.g. someone publishes defamatory matter about someone on a website or sends e mails containing defamatory information. (iv) 'arassment ( Cyber stal)ing % ,yber %talking 1eans following the mo&es of an indi&idualIs acti&ity o&er internet. It can be done with the help of many protocols a&ailable such at e mail, chat rooms, user net groups. (2) Against Property% (i) Credit Card *raud % (ii) Intellectual Property crimes % These include %oftware piracyE illegal copying of programs, distribution of copies of software. ,opyright infringementE Trademarks &iolationsE Theft of computer source codeE (iii) Internet time t+eft % the usage of the Internet hours by an unauthori!ed person which is actually paid by another person. ( ) Against Organisation (i) ,naut+ori!ed Accessing of Computer% $ccessing the computer<network without permission from the owner. it can be of @ formsE a4 ,hanging<deleting dataE :nauthori!ed changing of data. b4 ,omputer &oyeurE The criminal reads or copies confidential or proprietary information, but the data is neither deleted nor changed. (ii) &enial Of #ervice % When Internet ser&er is flooded with continuous bogus re7uests so as to denying legitimate users to use the ser&er or to crash the ser&er. (iii) Computer contamination - .irus attac) % $ computer &irus is a computer program that can infect other computer programs by modifying them in such a way as to include a 3possibly e&ol&ed4 copy of it. Diruses can be file infecting or affecting boot sector of the computer. Worms, unlike &iruses do not need the host to attach themsel&es to. (iv) $mail /ombing % %ending large numbers of mails to the indi&idual or company or mail ser&ers thereby ultimately resulting into crashing. (v) #alami Attac) % When negligible amounts are remo&ed J accumulated in to something larger. These attacks are used for the commission of financial crimes. (vi) 0ogic /omb % Its an e&ent dependent programme , as soon as the designated e&ent occurs, it crashes the computer, release a &irus or any other harmful possibilities. (vii) 1ro2an 'orse % an unauthori!ed program which functions from inside what seems to be an authori!ed program, thereby concealing what it is actually doing. (viii) &ata diddling % This kind of an attack in&ol&es altering raw data just before it is processed by a computer and then changing it back after the processing is completed. (") Against #ociety (i) *orgery % currency notes, re&enue stamps, mark sheets etc can be forged using computers and high 7uality scanners and printers. (ii) Cyber 1errorism % :se of computer resources to intimidate or coerce others. (iii) 3eb 4ac)ing % Hackers gain access and control o&er the website of another, e&en they change the content of website for fulfilling political objecti&e or for money.

Cyber crime and its nature


Cybercrime is a type of crime done by the help of computer and internet. It is basically e5tension of traditional crime with the help of new technology. The nature of cybercrime is virtual because in this crime there is no need to involve manually, but effects are the same as traditional crime. Today the use of computer and internet are growing very fast. we use them for doing important wor&s of our daily life. In fact we cannot live without computer and internet and so, the chances of being a victim of cyber crime is increasing fast. The cyber criminals target our information which we provide them accidentally while using computer and internet. There are so many types of cyber crimes which can harms a person.

Hacking
%ac&ing is a type of cyber crime. In simple words %ac&ing is an act by which a person access a computer system or networ& without permission of the owner. The person doing the hac&ing are called %ac&ers. They have best &nowledge and understanding of computer and computer program. They misuse their &nowledge and commit the crime of hac&ing. %ac&ers are also called crac&ers. There are many types of hac&ers li&e +hite %at %ac&ers, )lac& %at %ac&ers, ?rey %at %ac&ers etc. Among all of them, +hite %at %ac&ers are the persons who use their &nowledge for good purpose and chec& the security of any system or software.

How Hackers Changed the World - BBC documentary 2013

!ee a"" 3 photo$ .ma%e /redit0 1#y 2awke$ 3a$k .ma%e.4p%* by 5ectorporta" (// B6 !7 !o#rce: 1#y 2awke$ 3a$k .ma%e.4p%

Online Identity he!t


1nline theft is also a ma9or type of Cybercrime. :owadays, people using the Internet fre<uently use their sensitive data li&e. )an& details, credit card details, etc. on the Internet and cyber criminals target these data and commit online theft. Cyber criminals also target copyrighted content on the Internet and download and distribute it. This is a one part of 1nline Theft on the other hand there is an advanced stage of online theft that is called Identity Theft. +e all &now that a normal internet user has many online account including many social networ&ing accounts and they all have their username and password. Cybercriminals target that username and password and use the account behalf of original owner of the account. It damages the online presence and reputation of owner of account holder. It may also causes financial loss sometimes.

"enial-o!-#er$ice %ttack
In simple word ,enial3of3'ervice referred the act by which a user of any website or service denied to use the service or website. In this type of cyber crime criminals target the web server of the websites and flow a large number of re<uests to that server. This causes the use of ma5imum bandwidth of the website, and it goes slow down or not available for some times

&hishing

!ee a"" 3 photo$ !o#rce: http://By &abor at en.wikipedia (&ran$(erred (rom...

&hishing
Phishing an act by which cyber criminals attempt to &now the confidential data of any internet user. The ,ata may be the credit card number or username and password of any account. The main purpose of Phishing is to steal money or ac<uired other important data of any person, which causes financial loss. The act of Phishing done by sending e3mail or websites in which cyber criminals as& about your

personal information or there is a lin&, and they tell clic& on it. After clic&ing on that lin& the person may be the victim of Phishing.

#'amming and (mail Bombing


'pam is a message also &nown as 9un& mail, send with a web lin& or business proposal. Clic&ing on this lin& or responding to business proposal send to a phishing website or install a malware in your computer. The sender of these emails are always un&nown. @ou must aware to responding these type of spam mails because it tends towards some financial and data loss. 1n the other hand in email bombing an abuser sending huge numbers of email to target address and due to this that email address or mail server crashed. It feels li&e ,enial3of3service impact. It says that spamming is a variant of (mail bombing.

Web )acking
The world +eb Aac&ing comes from %i9ac&ing. In this type of cybercrime the cybercriminals hac&s the control of a website. They may able to change the content of that website. They use that website as li&e owner and the real owner of website has no more control on the website. 'ometime attac&ers as&s for ransom to the owner of the website

"ata "iddling
,ata ,iddling is unauthorised altering of data. +hen a person enter some data to his computer and output is different from input then he may victim of data diddling.It is done by a virus progarm that change the entered data.

#o!tware &iracy
'oftware Piracy is also a type of cybercrime and unfortunately most of Computer user are part of this crime. In this era of the Internet, you can easily download a movie or software via many websites or torrents. People often use a software without proper permission from the copyright holder of the software. They normally download the software and crac& the code and use the software without buying that. This act is also a part of software piracy. The following type of wor& constitute a cyber crime of 'oftware Piracy. $. Crac&ing the &ey of any software. 2. ;sing unlicensed software in your personal computer. B. ;sing single licensed software to multiple computer. C. ,istributing such type of software to other persons.

*ost dangerous Cyber Crime In your 'oint o! $iew+ which is the most dangerous Cyber Crime,

8ackin%

9n"ine .dentity &he(t :enia"0o(0!er)ice 7ttack ;hi$hin% !pammin% and Emai" Bombin% <eb =ackin% :ata :idd"in% !o(tware ;iracy

Main Types of Cyber crime


15 Against Individual
i( )rug traffic*ing

Drug traffickers are increasingly taking advantage of the Internet to sell illegal substances through encrypted e-mail. Some drug traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages of pills, and exchange recipes for amphetamines in restricted-access chat rooms. The increase in Internet drug trades could also be attributed to the lack of face-toface communication. Such virtual exchanges allo more intimidated individuals to more comfortably purchase illegal drugs. The sketchy effects that are associated ith drug trades are severely minimi!ed and the filtering process that comes ith physical interaction fades a ay.

ii(

&ffensi"e content & +arassment

The content in ebsites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons. In some cases these communications may be illegal. "round #$ %urisdictions place limits on certain speech and ban racist, blasphemous, politically subversive, libelous or slanderous, seditious, or inflammatory material that tends to incite hate crimes. The extent of these unla ful communications varies greatly bet een countries, and even ithin nations. It is a sensitive case in hich the courts can become involved in arbitrating bet een groups ith strong beliefs. &ne part of Internet pornography that has been the target of the strongest efforts at

curtailment is child pornography. Whereas the content may be offensive in a non-specific ay, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms, through ne sgroups, and by sending hate email to interested parties. "ny comment that may be found disrespectful or offensive is considered harassment.

2( ,gainst Indi"idual ro!erty


i( -lectronic $unds Transfer $raud
'lectronic funds transfer systems have begun to increase, and so has the risk that such transactions may be taken into hold and diverted. (alid credit card numbers can be easily intercepted electronically, as ell as physically) the digital information stored on a card can be recreated. In *++,, a -ussian hacker, (ladimir .evin, operating from St /etersburg, retrieved the computers of 0itibank1s central ire transfer department, and transferred funds from large corporate accounts to other accounts hich had been opened by his subordinates in The 2nited States. The above form of computer-related crime is not inevitably mutually exclusive, and need not occur in isolation. &ne robs telecommunications services and uses them for aimed vandalism, fraud, or in furtherance of a criminal conspiracy. 0omputerrelated crime may be intensive in nature, combining t o or more of the general forms.

ii(

)issemination of &ffensi"e Materials

0ontent considered by some people to be ob%ectionable abundantly exists in cyberspace. This includes, among much else, sexually explicit materials, racist propaganda, and instructions for the fabrication of inflammatory and explosive devices. Telecommunications systems can also be used for harassing, threatening or invasive communications, from the traditional obscene telephone call to its contemporary manifestation in 3cyber-stalking3, in hich persistent messages are sent to an un illing recipient. In one case, a man allegedly stole nude photographs of his former girlfriend and her ne boyfriend and posted them on the Internet, along ith her name, address and telephone number. The unfortunate couple, received phone calls and e-mails from strangers as far a ay as Denmark ho said they had seen the photos on the Internet. Investigations also revealed that the surmise as maintaining records about the oman1s movements and compiling information about her family. 0omputer net orks may also be used in advancement of extortion. In 'ngland, financial institutions ere reported to have paid portentous amounts to sophisticated computer criminals ho threatened to ipe out computer systems. "n article ingeminated four incidents bet een *++4 and *++$ in hich a total of ,#.$ million /ounds Sterling ere paid by senior executives of the organi!ations concerned, ho ere convinced of the extortionists1 capacity to crash their computer systems.

3( ,gainst .ociety
i( Cyber/bullying & Cyber/stal*ing
0yber-bullying is the harmful use of the Internet and related technologies to harm other people, in a deliberate, repeated, and hostile manner. "s it has become more often in society, particularly among young people, legislation and a areness campaigns have arisen to combat it. 0yber-bullying has subse5uently been defined as 3 hen the Internet, cell phones or other devices are used to send or post text or images for a particular purpose to hurt or embarrass another person3. 0yberbullying can be as simple as continuing to send e-mail to someone ho has said they ant no further contact ith the sender, but it may also include threats, sexual remarks, pe%orative labels , ganging up on victims by making them the sub%ect of ridicule in forums, and posting false statements as fact aimed at humiliation. 0yber-stalking is the use of the Internet or other electronic means to stalk an individual, a group of individuals, or an organi!ation. It may include false accusations, making threats, identity theft, and damage to data or e5uipment, the solicitation of minors for sex, or gathering information in order to harass. The definition of 3harassment3 must meet the criterion that a reasonable person, in possession of similar information, ould regard it as sufficient to cause another reasonable person distress. 0yber stalking is different from spatial stalking. 6o ever, it sometimes leads to it, or is accompanied by it.

ii.

Cyber bullying vs. Cyber stalking

The practice of cyber bullying is not limited to children, while the behavior is identified by the same definition in adults; the distinction in age groups is sometimes referred to as cyber stalking or cyber harassment when perpetrated by adults toward adults, sometimes directed on the basis of sex. Common tricks used by cyber stalkers are to vandalize a search engine or encyclopedia, to threaten a victim s earnings, employment, reputation, or safety. !epetition of such actions against a target by an adult constitutes cyber stalking.

4. Against Private Organizations


i( Theft of telecommunications ser"ices

The 3phone preachers3 of three decades ago set a precedent for hat has become a ma%or criminal industry today. 7y gaining access to an organi!ation8s telephone s itchboard 9/7:; individuals or criminal organi!ations can obtain access to dial-in<dial-out circuits and then make their o n calls or sell call time to third parties. &ffenders may gain access to the s itchboard by impersonating a technician, by fraudulently obtaining an employee1s access code, or by using hack soft are available on the internet. =e sophisticated offenders loop bet een /7: systems to evade detection. &ther forms of service theft include capturing 3calling card3 details and on-selling calls charged to the calling card account, and counterfeiting or illicit reprogramming of stored value telephone cards. It has been suggested that as long ago as *++>, security failures at one of the ma%or telecommunications carrier cost approximately ?#+> million, and that more recently, up to $@ of total industry turnover has been lost to fraud. 0osts to individual subscribers may also be significant. It has been recorded in one case, in the 2nited States) computer hackers had illegally obtained access to Scotland Aard1s telephone net ork and made ?B#>,>>> orth of international calls for hich Scotland Aard as responsible.

ii(

Telecommunications iracy

Digital technology permits perfect reproduction and has simplified the dissemination of print, graphics, sound, and multimedia combinations. The temptation to reproduce copyrighted material for personal purpose, for sale at a lo er price, or indeed, for free distribution, has proven irresistible to many. This piracy has caused considerable concern to o ners of copyrighted material. The Soft are /ublishers "ssociation has computed that approximately CD., billion orth of soft are as lost to piracy in *++4 ith C# billion of that being stolen from the Internet. It as found that, a copy of the most recent Eames 7ond =ilm FThe World is not enoughG as available free on the internet before its official release. When creators of a ork, are unable to profit from their creations, there can be a chilling effect on creative effort generally, in addition to financial loss.

%( ,gainst 0o"ernment1 nation


i( -lectronic 2andalism and -3tortion
As never before, western industriali2ed society is interdependent upon comple5 data processing and telecommunications systems. Any damage to, or interference with, any of these systems can lead to harmful conse<uences. +hether incited by curiosity or vindictiveness electronic intruders cause disoblige at best, and have the potential for inflicting massive harm. +hile this potential has yet to be cogni2ed, a number of individuals and protest groups have hac&ed the official web pages of various governmental and commercial organi2ations. ,efense planners around the world are considerably investing in information warfare33 means of interrupting the information technology infrastructure of defense systems. Attempts were made to interrupt the computer systems of the 'ri 4an&an ?overnment and of the :orth Atlantic Treaty 1rgani2ation at the time of $DDD bombing of )elgrade. .ecently, an e5tortionist in (astern (urope ac<uired the credit card details of customers of a :orth American based on3line music retailer, and published some on the Internet when the retailer refused to accept his demands.

ii.

Cyber Warfare and Terrorism

?overnment officials and Information Technology refuge specialists have ac&nowledged a significant rise in Internet problems and server scans since early 200$. )ut there is a growing apprehension among central officials that such intrusions are part of a well thought3out effort by cyber terrorists, foreign intelligence services, or other groups to map potential security holes in critical systems. A cyber terrorist is someone who intimidates or coerces a government or organi2ation to continue his or her political or social ob9ectives by introducing computer3based attac& against computers, networ&, and the information stored on them. Cyber terrorism in general, may be defined as an act of terrorism which has ta&en place through the use of cyberspace or computer resources. -or e5ample, a simple misinformation in the Internet, that there will be bomb attac&s during the holidays can be considered as cyber terrorism. As well there are also hac&ing activities intended towards individuals, families, organi2ed by groups within networ&s, tending to cause terror among people, demonstrate power, collecting appropriate information for ruining peoplesE lives, robberies, blac&mailing etc. Cyber e5tortion is a type of cyber terrorism in which a website, e3mail server, or computer system is sub9ected to repetitive re9ection of service or other attac&s by wic&ed hac&ers, who demand money in return for promising to stop the attac&s. -earing that such attac&s may become the custom in future warfare among nation3states, the concept of cyberspace operations impacts and will be adapted by war fighting military commanders in the future me out of the domain. Perpetrators characteristically use a scattered denial3of3service attac&.

3333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333333

Also various other small or rare forms of crimes forms of crimes form a part of the various types of cyber crime....

,gainst Indi"iduals: 4
i( estering "ia e/mails( ii( Cyber/stal*ing( iii( )istribution of obscene material( i"( Insult( "( Illegal control o"er com!uter system( "i( &ffensi"e e3!osure "ii( -mail s!oofing "iii( Cheating & $raud

,gainst Indi"idual ro!erty: /


i( Com!uter "andalism( ii( Transmitting "irus. i"( Unofficial access o"er com!uter system( "( Logical ro!erty crimes "i( 5Internet time6 thefts

,gainst ri"ate &rgani'ation: /


i( Unauthori'ed control1access o"er com!uter system ii( &7nershi! of non !ermitted information( iii( )istribution of !irated soft7are etc(

,gainst go"ernment1nation :/
i( Cyber terrorism against the go"ernment organi'ation .

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

Anda mungkin juga menyukai