SlideShare a Scribd company logo
1 of 2
Download to read offline
tech navigator

                                                                                         Property related crimes are a few categories
                                                                                         under which of cyber crimes are classified
                                                                                         into.

                                                                                         The Indian Information Technology Act
                                                                                         (2000) is primarily meant to legislation to
                                                                                         promote e-commerce and lacks the teeth
                                                                                         to handle cyber crime effectively. To add
                                                                                         to this, our law enforcement authorities are
                                                                                         quite inept to handle this new type of crime
                                                                                         and criminals.

                                                                                         Some Cyber crimes that we frequently hear
                                                                                         about are

                                                                                             Unauthorised access to
                                                                                               computer systems
                                                                                         This broadly falls into the term hacking.
                                                                                         Unauthorized use, or attempts to
                                                                                         circumvent or bypass the security
                                                                                         mechanisms of an information system or
                                                                                         network is termed as hacking.

                                                                                                    Email Bombing
                                                                                         Email bombing is characterized by abusers
                                                                                         repeatedly sending an email message to a
                                                                                         particular address at a specific victim site.
                                          T      HE increased use of computers and
                                                 the Internet has given raise to a new
                                          breed of criminals – Cybercriminals.
                                          Wikipedia defines Cybercrime as a term
                                                                                         Most cases this is designed to chock
                                                                                         bandwidth and to exhaust existing system
                                                                                         resources so as to bring down the system
                                          used broadly to describe activity in which     or the service that the system provides. This
                                          computers or networks are a tool, a target,    may inturn lead to a denial-of-service attack.
                                          or a place of criminal activity.
                                                                                         Email spamming is a variant of bombing;
                                          In 1820, Joseph-Marie Jacquard, a textile      it refers to sending email to hundreds or
                                          manufacturer in France, produced the           thousands of users (or to lists that expand
          By Gerard Sylvester
                                          loom. This device allowed the repetition       to that many users). Email spamming can
                                          of a series of steps in the weaving of         be made worse if recipients reply to the
                                          special fabrics. This resulted in a fear       email, causing all the original addressees to
                                          amongst Jacquard’s employees that their        receive the reply.
                                          traditional employment and livelihood were
                                          being threatened. They committed acts of        VIRUS/Trojan horse/Worms
                                          sabotage to discourage Jacquard from           A computer virus is a computer program
                                          further use of the new technology. This,       that can copy itself and infect a computer
                                          they say, is the first recorded cyber crime!   without permission or knowledge of the
                                                                                         user. The original may modify the copies
                                          Distributed Denial of Service (DDOS),          or the copies may modify themselves, as
                                          Email Bombing, VIRUS, Unauthorized             occurs in a metamorphic virus. A virus can
                                          access, Cyber stalking, Email/Website          only spread from one computer to another
                                          Spoofing, Pornography and Intellectual         when its host is taken to the uninfected

                                                                                                                  [turn on page 47]

                                Gerard Sylvester can be reached at sylvester_26@yahoo.com
Page 40      SAMACHAR July-August 2007




            PDF Created with deskPDF PDF Writer - Trial :: http://www.docudesk.com
[from page 44]


 computer, for instance by a user           will never manifest itself in the physical
 sending it over a network or carrying      sense but this does not mean that the
 it on a removable medium such as a         pursuit is any less distressing. There are
 floppy disk, CD, USB drive or by           a wide variety of means by which
 the Internet.                              individuals may seek out and harass
                                            individuals even though they may not
         Data Diddling                      share the same geographic borders, and
 Data diddling involves changing data       this may present a range of physical,
 prior or during input into a computer.     emotional, and psychological
 In other words, infor mation is            consequences to the victim.
 changed from the way it should be
 entered by a person typing in the                Child Pornography
 data, a virus that changes data, the       Child Pornography is a part of cyber
 programmer of the database or              pornography but it is such a grave
 application, or anyone else involved       offence that it is individually also
 in the process of having information       recognized as a cyber crime. The
 stored in a computer file. The culprit     Internet is being highly used by its
 can be anyone involved in the              abusers to reach and abuse children
 process of creating, recording,            sexually, worldwide. The Internet
 encoding, examining, checking,             explosion has made the children a viable
 converting, or transmitting data.          victim to the cyber crime. As more
 This is one of the simplest methods        homes have access to Internet, more
 of committing a computer-related           children would be using the Internet
 crime, because it requires almost no       and more are the chances of falling
 computer skills whatsoever. Despite        victim to the aggression of pedophiles.
 the ease of committing the crime,          The pedophiles use their false identity
 the cost can be considerable.              to trap children and even contact them
                                            in various chat rooms where they
         Salami Slicing                     befriend them and gain personal
 Salami slicing is the illegal practice     information from the innocent preys.
 of stealing money repeatedly in            They even start contacting children on
 extremely small quantities, usually by     their e-mail addresses. These pedophiles
 taking advantage of rounding to the        drag children to the net for the purpose
 nearest cent (or other monetary unit)      of sexual assault or so as to use them
 in financial transactions. It would be     as a sex object.
 done by always rounding down, and
 putting the fractions of a cent into             Cyber Defamation
 another account. Salami slicing is         Any derogatory statement, which is
 most often performed by employees          designed to injure a person’s business
 of the corporation that handles those      or reputation, constitutes cyber
 transactions, and, if not guarded          defamation. Defamation can be
 against, it can be difficult to detect.    accomplished as libel or slander. Cyber
                                            defamation occurs when defamation
         Cyber Stalking                     takes place with the help of computers
 Cyberstalking, which is simply an          and / or the Internet. E.g. someone
 extension of the physical form of          publishes defamatory matter about
 stalking, is where the electronic          someone on a website or sends e-mails
 mediums such as the Internet are           containing defamatory information to
 used to pursue, harass or contact          all of that person’s friends.Be a safe
 another in an unsolicited fashion.         Netizen! (a portmanteau of Internet
 Most often, given the vast distances       and citizen).
 that the Internet spans, this behavior                       ***

                                           SAMACHAR July-August 2007             Page 43

More Related Content

What's hot

Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineFtlwood Families
 
How prevent dos
How prevent dosHow prevent dos
How prevent dossnake9991
 
Ddos attack definitivo
Ddos attack definitivoDdos attack definitivo
Ddos attack definitivolilith333
 
3852_wlan_revised
3852_wlan_revised3852_wlan_revised
3852_wlan_revisedBalaji Ravi
 
Sis tue 0845 joseph rosenbaum
Sis tue 0845 joseph rosenbaumSis tue 0845 joseph rosenbaum
Sis tue 0845 joseph rosenbaumMediaPost
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in ManetIRJET Journal
 

What's hot (6)

Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_online
 
How prevent dos
How prevent dosHow prevent dos
How prevent dos
 
Ddos attack definitivo
Ddos attack definitivoDdos attack definitivo
Ddos attack definitivo
 
3852_wlan_revised
3852_wlan_revised3852_wlan_revised
3852_wlan_revised
 
Sis tue 0845 joseph rosenbaum
Sis tue 0845 joseph rosenbaumSis tue 0845 joseph rosenbaum
Sis tue 0845 joseph rosenbaum
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 

Viewers also liked

Viewers also liked (9)

PhilAgriNet
PhilAgriNetPhilAgriNet
PhilAgriNet
 
Google Hacking
Google HackingGoogle Hacking
Google Hacking
 
CIARD
CIARDCIARD
CIARD
 
Presentation at Witfor 2009
Presentation at Witfor 2009Presentation at Witfor 2009
Presentation at Witfor 2009
 
Web 2.0 & Social Media
Web 2.0 & Social MediaWeb 2.0 & Social Media
Web 2.0 & Social Media
 
D Space Installation
D Space InstallationD Space Installation
D Space Installation
 
Synthesis from the forum on ICT and Agriculture in the Context of Green Growth
Synthesis from the forum on ICT and Agriculture in the Context of Green GrowthSynthesis from the forum on ICT and Agriculture in the Context of Green Growth
Synthesis from the forum on ICT and Agriculture in the Context of Green Growth
 
Reusable Learning Objects
Reusable Learning ObjectsReusable Learning Objects
Reusable Learning Objects
 
The World Cafe
The World CafeThe World Cafe
The World Cafe
 

Similar to Cyber Crime

Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 

Similar to Cyber Crime (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
An overview of cyberimes
An overview of cyberimesAn overview of cyberimes
An overview of cyberimes
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 

More from Gerard Sylvester

Digital Technologies to Improve Value Chain Efficiency
Digital Technologies to Improve Value Chain EfficiencyDigital Technologies to Improve Value Chain Efficiency
Digital Technologies to Improve Value Chain EfficiencyGerard Sylvester
 
Digitalization to transform African Agriculture
Digitalization to transform African AgricultureDigitalization to transform African Agriculture
Digitalization to transform African AgricultureGerard Sylvester
 
Digital Agriculture: Trends and Challenges
Digital Agriculture: Trends and ChallengesDigital Agriculture: Trends and Challenges
Digital Agriculture: Trends and ChallengesGerard Sylvester
 
Data Ownership and Privacy
Data Ownership and PrivacyData Ownership and Privacy
Data Ownership and PrivacyGerard Sylvester
 
E-agriculture Trends and Challenges
E-agriculture Trends and ChallengesE-agriculture Trends and Challenges
E-agriculture Trends and ChallengesGerard Sylvester
 
Semantic Web Tools For Agricultural Materials
Semantic Web Tools For Agricultural MaterialsSemantic Web Tools For Agricultural Materials
Semantic Web Tools For Agricultural MaterialsGerard Sylvester
 

More from Gerard Sylvester (11)

Digital Technologies to Improve Value Chain Efficiency
Digital Technologies to Improve Value Chain EfficiencyDigital Technologies to Improve Value Chain Efficiency
Digital Technologies to Improve Value Chain Efficiency
 
Digitalization to transform African Agriculture
Digitalization to transform African AgricultureDigitalization to transform African Agriculture
Digitalization to transform African Agriculture
 
Digital Agriculture: Trends and Challenges
Digital Agriculture: Trends and ChallengesDigital Agriculture: Trends and Challenges
Digital Agriculture: Trends and Challenges
 
Data Ownership and Privacy
Data Ownership and PrivacyData Ownership and Privacy
Data Ownership and Privacy
 
E-agriculture Trends and Challenges
E-agriculture Trends and ChallengesE-agriculture Trends and Challenges
E-agriculture Trends and Challenges
 
CIARD
CIARDCIARD
CIARD
 
e-Agriculture
e-Agriculturee-Agriculture
e-Agriculture
 
Effective Google Searches
Effective Google SearchesEffective Google Searches
Effective Google Searches
 
Semantic Web Tools For Agricultural Materials
Semantic Web Tools For Agricultural MaterialsSemantic Web Tools For Agricultural Materials
Semantic Web Tools For Agricultural Materials
 
Webservices
WebservicesWebservices
Webservices
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 

Recently uploaded

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

Cyber Crime

  • 1. tech navigator Property related crimes are a few categories under which of cyber crimes are classified into. The Indian Information Technology Act (2000) is primarily meant to legislation to promote e-commerce and lacks the teeth to handle cyber crime effectively. To add to this, our law enforcement authorities are quite inept to handle this new type of crime and criminals. Some Cyber crimes that we frequently hear about are Unauthorised access to computer systems This broadly falls into the term hacking. Unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network is termed as hacking. Email Bombing Email bombing is characterized by abusers repeatedly sending an email message to a particular address at a specific victim site. T HE increased use of computers and the Internet has given raise to a new breed of criminals – Cybercriminals. Wikipedia defines Cybercrime as a term Most cases this is designed to chock bandwidth and to exhaust existing system resources so as to bring down the system used broadly to describe activity in which or the service that the system provides. This computers or networks are a tool, a target, may inturn lead to a denial-of-service attack. or a place of criminal activity. Email spamming is a variant of bombing; In 1820, Joseph-Marie Jacquard, a textile it refers to sending email to hundreds or manufacturer in France, produced the thousands of users (or to lists that expand By Gerard Sylvester loom. This device allowed the repetition to that many users). Email spamming can of a series of steps in the weaving of be made worse if recipients reply to the special fabrics. This resulted in a fear email, causing all the original addressees to amongst Jacquard’s employees that their receive the reply. traditional employment and livelihood were being threatened. They committed acts of VIRUS/Trojan horse/Worms sabotage to discourage Jacquard from A computer virus is a computer program further use of the new technology. This, that can copy itself and infect a computer they say, is the first recorded cyber crime! without permission or knowledge of the user. The original may modify the copies Distributed Denial of Service (DDOS), or the copies may modify themselves, as Email Bombing, VIRUS, Unauthorized occurs in a metamorphic virus. A virus can access, Cyber stalking, Email/Website only spread from one computer to another Spoofing, Pornography and Intellectual when its host is taken to the uninfected [turn on page 47] Gerard Sylvester can be reached at sylvester_26@yahoo.com Page 40 SAMACHAR July-August 2007 PDF Created with deskPDF PDF Writer - Trial :: http://www.docudesk.com
  • 2. [from page 44] computer, for instance by a user will never manifest itself in the physical sending it over a network or carrying sense but this does not mean that the it on a removable medium such as a pursuit is any less distressing. There are floppy disk, CD, USB drive or by a wide variety of means by which the Internet. individuals may seek out and harass individuals even though they may not Data Diddling share the same geographic borders, and Data diddling involves changing data this may present a range of physical, prior or during input into a computer. emotional, and psychological In other words, infor mation is consequences to the victim. changed from the way it should be entered by a person typing in the Child Pornography data, a virus that changes data, the Child Pornography is a part of cyber programmer of the database or pornography but it is such a grave application, or anyone else involved offence that it is individually also in the process of having information recognized as a cyber crime. The stored in a computer file. The culprit Internet is being highly used by its can be anyone involved in the abusers to reach and abuse children process of creating, recording, sexually, worldwide. The Internet encoding, examining, checking, explosion has made the children a viable converting, or transmitting data. victim to the cyber crime. As more This is one of the simplest methods homes have access to Internet, more of committing a computer-related children would be using the Internet crime, because it requires almost no and more are the chances of falling computer skills whatsoever. Despite victim to the aggression of pedophiles. the ease of committing the crime, The pedophiles use their false identity the cost can be considerable. to trap children and even contact them in various chat rooms where they Salami Slicing befriend them and gain personal Salami slicing is the illegal practice information from the innocent preys. of stealing money repeatedly in They even start contacting children on extremely small quantities, usually by their e-mail addresses. These pedophiles taking advantage of rounding to the drag children to the net for the purpose nearest cent (or other monetary unit) of sexual assault or so as to use them in financial transactions. It would be as a sex object. done by always rounding down, and putting the fractions of a cent into Cyber Defamation another account. Salami slicing is Any derogatory statement, which is most often performed by employees designed to injure a person’s business of the corporation that handles those or reputation, constitutes cyber transactions, and, if not guarded defamation. Defamation can be against, it can be difficult to detect. accomplished as libel or slander. Cyber defamation occurs when defamation Cyber Stalking takes place with the help of computers Cyberstalking, which is simply an and / or the Internet. E.g. someone extension of the physical form of publishes defamatory matter about stalking, is where the electronic someone on a website or sends e-mails mediums such as the Internet are containing defamatory information to used to pursue, harass or contact all of that person’s friends.Be a safe another in an unsolicited fashion. Netizen! (a portmanteau of Internet Most often, given the vast distances and citizen). that the Internet spans, this behavior *** SAMACHAR July-August 2007 Page 43