0
10kviews
Brief explanation of cybercrime classification
1 Answer
1
395views

1. E-Mail Spoofing

A spoofed E-Mail is one that appears to originate from one source but actually has been sent from another source. For example, let us say, Roopa has an E-Mail address roopa@asianlawsorg. Let us say her boyfriend Suresh and she happen to have a show down. Then Suresh, having become her enemy, spoofs her E-Mail and sends obscene/vulgar messages to all her acquaintances. Since the E-Mails appear to have originated from Roopa, her friends could take offense and relationships could be spoiled for life.

2. Spamming

People who create electronic Spam are called spammers. Spam is the abuse of electronic messages systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Although the most widely recognized form of Spam is E-Mail Spam, the term is applied to similar abuses in other media: instant messaging Spam, Usenet newsgroup Spam, web search engine Spam, Spam in blogs, wiki Spam, online classified ads Spam, mobile phone messaging Spam, Internet forum Spam, junk fax transmissions, social networking Spam, file sharing network Spam, video sharing sites, etc.

3. Internet Time Theft

Such a theft occurs when an unauthorized person uses the Internet hours paid for by another person. Basically, Internet time theft comes under hacking because the person who gets access to someone else's ISP user ID and password, either by hacking or by gaining access to it by illegal means, uses it to access the Internet without the other person's knowledge. However, one can identify time theft if the Internet time has to be recharged often,even when one's own use of the Internet is not frequent. The issue of Internet time theft is related to the crimes conducted through "identity theft."

4. Salami Attack/Salami Technique

These attacks are used for committing financial crimes. The idea here is to make the alteration so insignificant that in a single case it would go completely unnoticed for example a bank employee inserts a program, into the the the bank's servers, that deducts a small amount of money from the account of every customer. No account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount every month.

5. Data Diddling

A data diddling attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed. Electricity Boards in India have been victims to data diddling programs inserted when private parties computerize their systems.

6. Forgery

Counterfeit currency notes, postage and revenue stamps, marksheets, etc. can be forged using sophisticated computers, printers and scanners. Outside many colleges there are miscreants soliciting the sale of faked marksheets or even degree certificates.These are made using computers and high quality scanners and printers. In fact, this is becoming a booming business involving large monetary amount given to student gangs in exchange for these bogus but authentic looking certificates.

7. Web Jacking

Web jacking occurs when someone forcefully takes control of a website (by cracking the password and later changing it). Thus, the first stage of this crime involves "password sniffing." The actual owner of the website does not have any more control over what appears on that website.

8. E-Mail Bombing/Mail Bombs

E-Mail bombing refers to sending a large number of E-Mails to the victim to crash victim's E-Mail account (in the case of an individual) or to make victim's mail servers crash (in the case of a company or an E-Mail service provider). Computer program can be written to instruct a computer to do such tasks on a repeated basis. In recent times, terrorism has hit the Internet in the form of mail bombings. By instructing a computer to repeatedly send E-Mail to a specified person's E-Mail address, the cybercriminal can overwhelm the recipient's personal account and potentially shut down entire systems. This may or may not be illegal, but it is certainly disruptive.

9. Usenet Newsgroup as the Source of Cybercrimes

Usenet is a popular means of sharing and distributing information on the Web with respect to specific topic or subjects. Usenet is a mechanism that allows sharing information in a many-to-many manner. The news- groups are spread across $30,000$ different topics. In principle, it is possible to prevent the distribution of specific newsgroup. In reality, however, there is no technical method available for controlling the contents of any newsgroup. It is merely subject to self-regulation and net etiquette. It is feasible to block specific newsgroups, however, this cannot be considered as a definitive solution to illegal or harmful content. It is possible to put Usenet to following criminal use:

  • Distribution/sale of pornographic material;
  • Distribution/sale of pirated software packages
  • Distribution of hacking software;
  • Sale of stolen credit card numbers.
  • Sale of stolen data/stolen property.

10. Password Sniffing

Password Sniffers are programs that monitor and record the name and password of network users as they login, jeopardizing security at a site. Whoever installs the Sniffer can then impersonate an authorized user and login to access restricted documents. Laws are not yet set up to adequately prosecute a person for impersonating another person online. Laws designed to prevent unauthorized access to information may be effective in apprehending crackers using Sniffer programs.

11. Identity Theft

Identity theft is a fraud involving another person's identity for an illicit purpose. This occurs when a criminal uses someone else's identity for his/her own illegal purposes. Phishing and identity theft are related offenses. Examples include fraudulently obtaining credit, stealing money from the victim's bank accounts, using the victim's credit card number , establishing accounts with utility companies, renting an apartment or even filing,bankruptcy using the victim's name. The cyberimpersonator can steal unlimited funds in the victim's name without the victim even knowing about it for months, sometimes even for years!

12. Credit Card Frauds

Information security requirements for anyone handling credit cards have been increased dramatically recently. Millions of dollars may be lost annually by consumers who have credit card and calling card numbers stolen from online databases. Security measures are improving, and traditional methods of law enforcement seem to be sufficient for prosecuting the thieves of such information. Bulletin boards and other online services are frequent targets for hackers who want to access large databases of credit card information. Such attacks usually result in the implementation of stronger security systems.

Please log in to add an answer.