A computer crime is any illegal action where the data is accessed through computers or internet without any permission.
Computer crime or Cyber crime is a form of crime where the Internet or computers are used to commit crime. Issues surrounding this type of crime have become high-profile, particularly hacking, copyright breach (breaking the contract), child pornography (representation of sexual activity), murder, theft.
The characteristics of the computer crime are:
- Illegal behavior that is punishable by the law.
- specific way for committing crime using computer.
- special object for protection, security of computer’s data.
Illegal activities are carried out with the use of computer. Computer crime includes criminal breach, theft of computerized data, and the use of an on-line system to commit a fraud.
The computer can be a target of a crime or an instrument of a crime.
Cyber crime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files, stealing millions of dollars from online bank accounts.
Cyber crime includes any criminal act dealing with computers and networks
(called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example, credit card account theft is considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.
Hence, the computer will be looked at as either a target or tool.
Computer forensics is a scientific collection, examination, authentication (verification), preservation and analysis of data held or retrieved from computer storage in such a way that the information can be used as evidence in a court of law.
It deals with the following problems :
- Recovering deleted, encrypted or damaged file (data) from the computer
- Securely storing and handling recovered electronic data.
- Presenting the information to a court of law.
Electronic evidence exist on computer storage in the form of computer files.
for eg. : 1) If the files has been deleted on computer storage, it can recover
through various techniques. Computer forensics experts try to
Archive : An Archive is usually a copy of an application and retained for several years.
Retrieve : If the archived file is required again, we can retrieve it.
Delete : The file should be retained for as long as it is needed, then deleted. This will be governed by legal requirements. The backups must be deleted too, but the latest backup may be kept for a while.
Most of this information is collected, processed and stored on computers and transmitted across networks to other computers. If this information destroy into the wrong hands, it could lead to lost business, law suits or even bankruptcy (unable to pay one’s debt) of the business. Because of this issues, information security is required.
Information security means protecting information and information systems from unauthorized user access. This is called as information security, computer security or information assurance.
Information Security include network security, application and database security, security testing, business continuity planning, digital forensic science and biometric techniques (fingerprints, eyes, voice, etc.)
Programs and data can be secured by issuing passwords and digital certificates to authorized users. However, passwords only validate that a correct number has been entered.