Premium Essay

Introduction to Cyber Crime

In: Computers and Technology

Submitted By amneetb2
Words 1944
Pages 8
-------------------------------------------------
CYBER CRIME IN ITS VARIOUS FORMS
-------------------------------------------------
Amneet Bedi
-------------------------------------------------
CSE-Dept, RBCENTW Hoshiarpur
-------------------------------------------------
e-mail.: amneetb2@gmail.com
-------------------------------------------------

-------------------------------------------------

-------------------------------------------------
Abstract: This Paper is a review paper on the topic of Cybercrime and its forms. The paper describes very basic information about cybercrime. It includes introduction to cyber crime, its brief history, its types along with their brief description, today’s scenario regarding cybercrime and an introduction to cyber security as a weapon against cybercrime . The paper is best suited for those who want to understand what cybercrime exactly is at the beginners’ level and what are the prevailing cybercrimes.
-------------------------------------------------
Keywords: Cybercrime, cyber security, Hacking, spoofing, Cyber stalking, DOS Attack, Computer Vandalism, Cyber terrorism, Softaware Piracy, Phishing, Data diddling, Virus/ Worms, Trojan ,Cyber Laundering, Cyber contraband.
-------------------------------------------------
Introduction: Today , the world is moving towards a point where everything from banking, stock exchanges, traffic control, telephones to electric power, health care, welfare and education depends on software. Undoubtedly, this advancement and globalization offers many benefits to consumers and businesses but, unfortunately it also offers plenty of opportunities to organized crime. Globalization has promoted and strengthened the economics of illegal activities; offenders have become international entrepreneurs. The Internet provides money and information to all sorts of customers and businesses. It is...

Similar Documents

Premium Essay

Introduction to Cyber Crime

...CYBER CRIME IN ITS VARIOUS FORMS Abstract: This Paper is a review paper on the topic of Cybercrime and its forms. The paper describes very basic information about cybercrime. It includes introduction to cyber crime, its brief history, its types along with their brief description, today’s scenario regarding cybercrime and an introduction to cyber security as a weapon against cybercrime . The paper is best suited for those who want to understand what cybercrime exactly is at the beginners’ level and what are the prevailing cybercrimes. Keywords: Cybercrime, cyber security, Hacking, spoofing, Cyber stalking, DOS Attack, Computer Vandalism, Cyber terrorism, Softaware Piracy, Phishing, Data diddling, Virus/ Worms, Trojan ,Cyber Laundering, Cyber contraband. Introduction: Today , the world is moving towards a point where everything from banking, stock exchanges, traffic control, telephones to electric power, health care, welfare and education depends on software. Undoubtedly, this advancement and globalization offers many benefits to consumers and businesses but, unfortunately it also offers plenty of opportunities to organized crime. Globalization has promoted and strengthened the economics of illegal activities; offenders have become international entrepreneurs. The Internet provides money and information to all sorts of customers and businesses. It is notably the home of virtual worlds and their economies, which have attracted many people, including criminals. The......

Words: 1930 - Pages: 8

Free Essay

Cyber Crime

...CYBER CRIME Presented by : GROUP 3 CONTENT • • • • • • • • • • Introduction History of cyber crime Definition Categories of cyber crime Types of cyber crime Cybercrime statistics Cyber Threat Evolution Cyber crime in Philippines Safety tips Conclusion WHAT DO YOU KNOW? INTRODUCTION • Cybercrime is a term used broadly to describe activity in which computers or networks are a tool, a target, or a place of criminal activity. INTRODUCTION • Examples of cybercrime in which the computer or network is a TOOL of the criminal activity - Spamming and - Criminal copyright crimes, particularly those facilitated through peer-to-peer networks. INTRODUCTION • Examples of cybercrime in which the computer or network is a TARGET of criminal activity • - Unauthorized access (i.e, defeating access controls), • - malicious code, and denial-of-service attacks. INTRODUCTION • Examples of cybercrime in which the computer or network is a PLACE of criminal activity - theft of service (in particular, telecom fraud) and - certain financial frauds. BRIEF HISTORY • The first recorded cyber crime took place in the year 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. DEFINITION • Cyber Crime is a Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs. Cybercrime is nothing but where the......

Words: 1366 - Pages: 6

Premium Essay

Cyber Security and Its Challenges to Society

...------------------------------------------------- Cyber security and its challenges to society Final Project Report Group Members Abdul Majid Qayyum Umair Arshad Hasnat Ahmed Gulraiz Shabbir Contents Introduction: 3 Why is cyber security important? 4 The Impact of Cyber Security 5 The Cultural Impact 5 The Official Impact 5 The Solution Impact 5 Defining Cyber Security 6 Technology & Modern Life 6 What is Cyberspace? 6 What is Cyber Warfare? 6 Cyber is not Hype 7 What Cyber Security Isn’t 7 Cyber-crime 8 Types of Cyber-crimes 8 Hacking: 8 Theft: 8 Cyber Stalking: 9 Identity Theft: 9 Malicious Software: 9 Child soliciting and Abuse: 9 Cyber Bullying 10 Causes of Cyber-crime 10 History of Cyber-crime 10 Cyber-crime in Modern Society 11 Categories of Cyber-crime 11 Individual: 12 Property: 12 Government: 12 How to Tackle Cyber-crime 12 RECENT SURVEY ISSUES ON CYBER SECURITY TRENDS 14 Mobile Devices and Apps 14 Social Media Networking 14 Cloud Computing 14 Protect systems rather Information 15 New Platforms and Devices 15 Everything Physical can be Digital 15 Survey Questions 16 Conclusion 16 Cyber Security and its Challenges to Society Introduction: Over the past several years, experts and policy makers have expressed increasing concerns about protecting internet from cyber-attacks—deliberate attempts by unauthorized persons to access. Many experts expect the number and severity of cyber-attacks to increase over the next several......

Words: 3707 - Pages: 15

Premium Essay

Cyber Stalking Case Report

...Introduction Cyber Stalking is defined as a distinctive form of criminal activity composed of a series of actions that is taken individually might form an illegal behavior. (The free dictionary , 2013-2015). In this report I’m going to discuss about the history and background of Cyber Stalking and how did it grow and developed, moreover about the present situation of Cyber Stalking and the illustration, in addition of some of the Federal laws that deal with online stalking. History/background There is lack of information on the history of Cyber Stalking, but it is very evident that inception cyber stalking possibility of stalking on the internet is very real (Pittaro, 2007). Growth and development Cyber stalking has increased over the years with the growth of new technology, and the new ways of stalking victims have invented. For instance, a disgruntled employee is easily poses on their boss on social network sites and post messages that explicit: We have the spouse that uses the GPS to track the movements of their better half. It is obvious that even the police are not safe from this crime as we have gang members or other organized criminals finding the addresses of police officers from the internet and threaten them (Sankary, 2006)...

Words: 850 - Pages: 4

Free Essay

Cyber Crime in Bangladesh

...RECENT TREND OF CYBER CRIME IN BANGLADESH : LAWS AND PRACTICES GOLAM RABBANI Student of LLM Roll 10119032 Department of Law Rajshahi University BANGLADESH E-mail: g.rabbani.law@gmail.com Recent Trend Of Cyber Crime In Bangladesh : Laws & Practices INTRODUCTION The development in information technology and electronic media especially from 1980`s onwards have given raised to a new variety of computer related crimes which are commonly called cyber-crime. The cyber-crime may be done by using computer only, but this crime may be done very easily by using internet. Cyber crime or computer crime refers to any crime that involves a computer  and a networks. Some authorities feel that the term cyber-crime is misnomer as this term is nowhere defined in any statutes or act enacted by the Parliament. In a sense is radically different from the concept of conventional crime in so far as both include conduct whether act or omission which causes breach of law and therefore, it is punishable by the state. It is not surely said that, from when the cybercrime was started but in 1999 at Tywan a virus was attracted named CIH, made the topic of cyber-crime familiar to the whole world. In the present time people become more dependent on computer and internet, as result, we can’t not think our daily activities without this technological help. For this reason, some self-gainer people chose this technological way to make any crime easily.......

Words: 1924 - Pages: 8

Premium Essay

Term Paper

...Cyber Crime and Security Submitted by: ABSTRACT : Society is becoming more dependent upon data and networks to operate our businesses, government, national defense and other critical functions. Cybercrime, which is rapidly increasing in frequency and in severity, requires us to rethink how we should enforce our criminal laws. The current model of reactive, police-based enforcement, with its origins in real-world urbanization, does not and cannot protect society from criminals using computer technology. This paper gives detailed information regarding cybercrime, its types, modes of cyber crime and security measures including prevention to deal effectively with cybercrime. It demonstrates a need for a timely review of existing approaches to fighting this new phenomenon of cybercrime in the information age. Though it is not possible to remove Cyber Crime from the world but we can reduce it to a large extent by creating awareness in Society. We suggest a system of administrative regulation backed by criminal sanctions that will provide the incentives necessary to create a workable deterrent to cybercrime. Index: 1. Introduction 2. Types of Cyber Crimes 3. Cyber Criminals 4. Mode of Cyber Crimes 5. Security 6. Case Study 7. Conclusion 8. References Introduction: Cybercrime is an umbrella term that covers a wide array of attacks and scams.Cyber crime also known as Computer crime generally refers to criminal activity where a computer or......

Words: 279 - Pages: 2

Free Essay

Assignment on Cyber Crime

...Title Content page no Introduction…………………………………………………….……………………………….1 What is cybercrime? ..........................................................................................................1 Types of cybercrime……………………………………………………………………………..2 Reasons of cybercrime……………………………………………………………..……………2-3 Offences of cybercrime under ICT Act-2006……………………………………………………3 Penalties of cybercrime under ICT Act-2006 ……………………………………………………4 Cyber Tribunal …………………………………………………………………………………...5 Cyber appellate Tribunal ………………………………………………………………………….5 Recent condition of cyber law in Bangladesh……………………………………………………..6 Recommendations……………………..………………………………………………………….6 Conclusion ………………………..………………………………………………………………7 Bibliography …………….………………………………………………………………………..8 Introduction Information and communications technology (ICT) is often used as an extended synonym for information technology (IT), but is a more specific term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information. The phrase ICT had been used by academic researchers since the 1980s, but it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997 and in the revised National......

Words: 6414 - Pages: 26

Premium Essay

Ifsm B-1

...Computer-Based Crimes INTRODUCTION/PROBLEM STATEMENT Today’s technology has opened up a new realm of criminal activity, and new ways to exploit innocent people. Cyber-related crimes have been increasing for the past decade and include a number of different illegal activities to include: identity theft, phishing, cyber-stalking, and the use of malware. Criminal activities are of course, unethical, and cyber-crimes are no exception. It is a problem plaguing our society, and people have to be diligent to avoid being attacked and exploited. “It seems that everything relies on computers and the internet now — communication, entertainment, transportation (car engine systems, airplane navigation), shopping, and medicine (equipment, medical records). How much of your daily life relies on computers? How much of your personal information is stored either on your own computer or on someone else's system? Cyber security involves protecting that information by preventing, detecting, and responding to attacks” (US CERT, 2013). Today, we’ll look at an ethical approach (Reynolds' Seven-Step Ethical Decision-Making Approach) to develop protective measures that could help in mitigating cyber-crimes Ethically, cyber-crimes really boil down to what’s right and wrong. Deontological theories focus on the right action, doing the right thing, no matter the consequences. All humans on this planet have a deontological duty to do what’s right for fellow man; and committing......

Words: 1300 - Pages: 6

Premium Essay

Essay On Cybercrime

...Title: Cybercrime is on a rise in UAE Part1: Introduction Crime is a popular issue that we always heard in this globalization era. It refers to any violation of law or the commission of an act forbidden by law. It can contribute to negative impact in term of social and economic development. Nowadays, there are a lot of crimes which increase around the world; United Arab Emirates is one of the countries at risk of these issues. One of these types is the cybercrime as; people want to keep up with technology and modern life. This matter in increase day by day as every day we hear from the news, newspaper and social media, there's a huge number of people who are victims cybercrime. Brenner (2010) in Cybercrime: Criminal Threats from Cyberspace book state, this type of crimes found in 21-century after the development and globalization because people used technology, but they don't have enough information and not aware about this issue. In addition, Cybercrime is the type of criminal crime which is punishable by law and it means that Using technology resources. Such as, the internet for committing serious crimes such as, deception, fraud, theft, copyright violations and extortion through online stalking, harassment, defamation, and invasion of privacy. Moreover, The cybercrime divided into three divisions, the first division is crimes...

Words: 1569 - Pages: 7

Free Essay

Cyber Crime in Bangladesh

...Chapter 1 INTRODUCTION 1.1 Definition of Cyber Crime The internet in Bangladesh is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. “The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb”. The term ‘cyber crime’ has been evolved from two words ‘cyber’ and ‘crime’. ‘Crime’ is more or less known to each individual on his own stand point, while ‘cyber’ is almost vague in meaning to the same. So if any time anybody uses the prefix ‘cyber’, we simply mean, he is talking about something is doing online or there has certain networking system. Actually anything related to Internet falls under the cyber category. Computer crime or cyber crime is a form of crime where the Internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have......

Words: 14728 - Pages: 59

Free Essay

Cyber Crime

...Cyber crimes and effectiveness of laws in India to control them Under the Supervision of Dr. P.K. Rai Birendra Singh (M.Phil(CS)) Department of Computer Science APSU Rewa ABSTRACT:- India owes a lot to the exponential growth of the Information Technology service Industry over the last 15 years. Though India got its first codified Act in the Information Technology Act (“IT Act), in the year 2000, the IT Industry and in fact all businesses with cross-border obligations have been left crying themselves hoarse for more! The Indian Legislature has now passed a mish –mash legislation in December 2008, which clearly demonstrates the appeasement policy adapted to meet the various and in some instances divergent interests of the Industry and the Government. The scope of this paper is to highlight some important provisions of the cyber criminal laws in India relating to data protection, privacy, encryption and other cyber crimes and the extent to which the said provisions arm the enforcement authorities to combat not just existing but emerging trends in Cyber Crime. INTRODUCTION:- The general laws in India were drafted and enacted in the 19th century. Whilst each of the general laws have undergone modifications and amendments, the broad and underlying provisions have withstood the test of time, including unimaginable advancements in technology, which speaks to the dynamism of the General laws. The general laws referred to in this Article are the Indian Penal Code, 1860 (“IPC”),......

Words: 2370 - Pages: 10

Free Essay

Cyber Law of Bd

...Efficiencies of Cyber law in Bangladesh জুন 26, 2011 0 inShare Technology is getting more frequently used and seems like a blessing going cover Bangladesh. But sometimes we can see some bad- naughty peoples use the same technology to make crime in the cyber area. As well as day by day Cyber crimes are increasing in the world as well as our country. Therefore in Bangladesh a bundle of laws has been enacted to protect the people. Cyber law in Bangladesh In the Information Communication Technology Act of Bangladesh does not define what the Cyber law by any section is. But Cyber laws are contained in the Information and Communication Technology Act, 2006. Therefore this Act provide the legal infrastructure for e-commerce others legal solution relating with cyber crime in Bangladesh. The said Act enable (a) Legal recognition of electronic transaction, (b) Legal recognition of digital signature, (c) Acceptance to con- tract expressed by electronic means, (d) e-commerce and electronic form, (f) publication of official gazette in the electronic form, (g) prevention of computer crime, forged electronic records, international alteration of electronic records fraud, forgery or falsification in e-commerce and electronic transaction, (h) and others solutions of the crime relation with information Communication Technology. Objectives of the ICT Act, 2006 The objectives of the ICT Act, 2006 has been provided following purposes such as To smooth the progress of electronic filing of documents...

Words: 695 - Pages: 3

Premium Essay

Internet Censorship

...A COMPREHENSIVE ANALYSIS ABOUT NECESSICITY OF INTERNET CENSORSHIP TO AVOID INCREASING CYBER CRIMES INTRODUCTION- In today’s life, we all are living in an internet age. Nearly everyone is using internet, computer or electronics source for the sake of mankind. We all are very dependent on all these modern equipments. Now it is one of the part and parcel of our day to day life. Earlier we always used to say that bread, cloth and house are three essential necessicities of mankind but now we have to add one most essential necessicities i.e. Use of computer. We all are so habitual and so dependent on computers such that if in future computers stops working then our life will also stops at the same time. As every coin has two sides, the computer also has one dark side. As we all are very much familiar about use of knife .It plays important role in everyone kitchen. Almost all uses the knife for the purpose of cutting the vegetables. But very few people use the knife for killing or hurting others. In the same way, few people are using the internet, computer for the purpose of doing wrong deeds or for doing crime. Day by day the use of computer as a weapon for the purpose of some misdeed is increasing. Many people have affected due to misuse of computer. Such people experienced monetary loss as well as defamation of image .Many girls facing trouble due unauthorized obscene profiles created by unknown persons without taking their prior permission. Young......

Words: 1226 - Pages: 5

Premium Essay

No Paper

...ON CYBER CRIME BY ONUOHA, MAUREEN CHIZOBA C/O MR. DIKE G. OKORONKWO, PLOT 607 MONSTERRADO STREET, (NEAR RUSSEL CENTRE) WUSE ZONE 4, ABUJA, NIGERIA 2348055954286 27TH MAY, 2005 onuchizoba@yahoo.com INTRODUCTION Over the past twenty years, unscrupulous computer users have continued to use the computer to commit crimes; this has greatly fascinated people and evoked a mixed feeling of admiration and fear. This phenomenon has seen sophisticated and unprecedented increase recently and has called for quick response in providing laws that would protect the cyber space and its users. The level of sophistication has gone high to the point of using the system to commit murder and other havoc. The first recorded cyber murder committed in the United States seven years ago according to the Indian Express, January, 2002 “has to do with an underworld don in hospital to undergo a minor surgery. His rival goon hired a computer expert who altered his prescriptions through hacking the hospital’s computer system. He was administered the altered prescription by an innocent nurse, this resulted in the death of the patient”[i] This work seeks to define the concept of cyber-crime, identify reasons for cyber-crime, how it can be eradicated, look at those involved and the reasons for their involvement, we would look at how best to detect a criminal mail and in conclusion, proffer recommendations that would help in checking the increasing rate of......

Words: 2267 - Pages: 10

Premium Essay

Computer Science

...“Categories of Computer Crime” Marcus S. Mathews Professor Fleming CIS 170 7/15/12 Introduction In this week’s assignment, the author will talk about the four categories of computer crimes. The author will give examples of each. The author will also point out which category of computer crime is currently the most prevalent and why he believes this to be so. And finally, the author will try to point out what he believes the criminal justice system can improve upon to better combat cyber crime. The first category of computer crime is the computer as a target. This type of cyber-crime requires a level of technical knowledge from its perpetrators. Cyber-crime is relatively new, however, has been in existence since the implementation of computers in mainstream society. This could be a general explanation as to why and how unprepared society and the world are towards fighting these types of crimes [ (Joseph, 2006) ]. There are numerous crimes of this nature being committed on a daily basis. Examples of cyber-crime where the computer itself is the target include things like data alteration, denial of network access, theft of information, denial of service, and vandalism. The next category that the author would like to point out is the computer as an instrument of a crime. What this means is that the computer is used to profit with some other criminal activity in mind. Some examples of this are general theft, theft of service, fraud, and threats and/or harassment [......

Words: 1361 - Pages: 6