27-09-2016, 10:00 AM
1456252767-abstract.docx (Size: 808.83 KB / Downloads: 3)
Abstract:
Computer crime is a general term that embraces such as phishing, credit card frauds, bank robbery, illegal downloading, industrial espionage, child pornography, kidnapping children via chat rooms, scams, cyber terrorism, creation and/or distribution of viruses, Spam and so on. Cybercrime is becoming ever more serious. Findings from the 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we define different types of cybercrime and review previous research and current status of fighting cybercrime in different countries that rely on legal, organizational, and technological approaches. We focus on a case study of fighting cybercrime in India and discuss problems faced. Finally, we propose several recommendations to advance the work of fighting cybercrime.
INTRODUCTION
Like traditional crime, cybercrime can take many shapes and can occur nearly anytime or anyplace. Criminals committing cybercrime use a number of methods,depending on their skill-set and their goal. This should not be surprising cybercrime is, after all, simply 'crime' with some sort of 'computer' or 'cyber' aspect. Cybercrime has surpassed illegal drug tracking as a criminal moneymaker.Every 3 seconds an identity is stolen. Without security, your unprotected PC canbecome infected within four minutes of connecting to the internet. The Council of Europe's Cybercrime Treaty uses the term 'cybercrime' to refer to offenses ranging from criminal activity against data to content and copyright infringement [Krone,2005]. However, others [Zeviar-Geese,1997-98] suggest that the definition is broader, including activities such as fraud, unauthorized access, child pornography, and cyberstalking. The United Nations Manual on the Prevention and Control of Computer Related Crime includes fraud, forgery, and unauthorized access [United Nations, 1995] in its cyber-crime definition. As you can see from these definitions, cybercrime can cover a very wide range of attacks. Understanding this wide variation in types of cybercrime is important as different types of cybercrime require different approaches to improving your computer safety.
DEFINITION – CYBER CRIME
Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs.
Cybercrime is nothing but where the computer used as an object or subject of crime. Most of these crimes are not new. Criminals simply devise di erent ways to undertake standard criminal activities such as fraud , theft , blackmail and forgery using the new medium , often involving the Internet .
Categorize of Cybercrime
Cyber Crime may be basically divided into 3 categories-
• Against Persons
• Against Property
• Against Government
Against Person:
Cybercrimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail, and cyber-stalking.
The distribution, posting, and dissemination of obscene material including pornography, indecent exposure, and child pornography, constitutes one of the most important Cybercrimes known today. The potential harm of such a crime to humanity can hardly be overstated..
Against Property:
The second category of Cybercrimes is that of Cybercrimes against all forms of property. These crimes include unauthorized computer trespassing through cyberspace, computer vandalism, transmission of harmful programs, and unauthorized possession of computerized information.
Against Government:
The third category of Cybercrimes relate to Cybercrimes against Government. Cyber Terrorism is one distinct kind of crime in this category. The growth of Internet has shown that the medium of Cyberspace is being used by individuals and groups to the international governments as also to threaten the citizens of a country. This crime manifests itself into terrorism when an individual "cracks“ into a government or military maintained website.
Examples Of cyber-Crime:
ONLINE FRAUDPhishing is essentially an online con game, and phisher’s are nothing morethan tech-savvy con artists and identity thieves. They use spam, fake Web sites,crimeware and other techniques to trick people into divulging sensitiveinformation, such as bank and credit card account details. Once they've capturedenough victims' information, they either use the stolen goods themselves todefraud the victims (e.g., by opening up new accounts using the victim's name or
draining the victim's bank a/c).
Viruses:
A computer virus is a computer program that can infect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of it. Note that a program does not have to perform outright damage (such as deleting or corrupting files) in order to be called a "virus".
Many people use the term loosely to cover any sort of program that tries to hide its (malicious) function and tries to spread onto as many computers as possible. Viruses are very dangerous; they are spreading faster than they are being stopped, and even the least harmful of viruses could be fatal. For example, a virus that stops a computer and displays a message, in the context of a hospital life-support computer, could be fatal. Even the creator of a virus cannot stop it once it is "in the wild".
Spam
is the term used for unsolicited, impersonal bulk electronic messages. Although email spam is the most common form of spamming, others exist, like mobile phone messaging spam and instant messaging spam.Spam involves sending nearly identical messages to thousands (or millions) of recipients. Spammers use software robots, called spambots (also Web crawlers or Web spiders) in order to get valid email addresses from company Web sites, blogs and newsgroups. Common subjects of spam messages are pornographic or other sexually related Web sites, various financial services or get-rich-quick schemes and health products.Spam messages normally have a fake origin address, which is randomly generated, in order to keep the author of the message from being easily discovered.
Types of Cybercrime
HACKING:
Hacking in simple terms means an illegal intrusion into a computer system and/or network. . It is also known as CRACKING. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.
CHILD PORNOGRAPHY:
The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.
DENIAL OF SERVICE ATTACK:
This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide
VIRUS DISSEMINITION:
Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc)
What is cyber security?
Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
Though, cyber security is important for network, data and application security.
Safety tips :-
Use antivirus software’s.
Insert firewalls.
Uninstall unnecessary software
Maintain backup.
Check security settings.
Stay anonymous - choose a genderless screen name.
Never give your full name or address to strangers.
Learn more about Internet privacy.
Contd…
Learn ‘inetiquette' - follow it and expect it from others
Don't respond to harassing or negative messages (flames)
Get out of uncomfortable or hostile situations quickly
Save offending messages
Learn more about Internet privacy
Advantages of cyber security
The cyber security will defend us from critical attacks.
It helps us to browse the safe website. Internet security process all the incoming and outgoing data on our computer
CONCLUSION
Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.