What is cyber crime?

  • criminal activity
  • Using Computer and Internet
  • Break law and harm

“Criminal activity done using computer and internet

What are the characteristics of cyber crime

  • Unlawful functions.
  • Computer used – a tool or – a target or – both as a target or – the equipment is used.
  • Goal – attack/attacked to steal other assets.

There is no major difference in traditional crime versus cyber crime. The only difference is the medium through which crime is committed. To achieve access to knives and weapons vs. port scanners, viruses and worm groups or individuals. The intention is to embezzle money or any valuable thing. The physical presence of a criminal at the crime site is not necessary.

What are the threats of cyber crime

  • Reputation and damage to morale
  • Theft of identifyable information
  • IP theft including data theft
  • Disruption
  • Financial loss
  • Regulatory Risk
  • Cost of Damage and Damage Control

The objectives of cyber crime and the desire to reach the prohibition of greed strength, the promotion of greed power, a destructive mindset to reach the prohibited information

Aspects of technology that makes cyber crime an easy option. Comparison in small places in small places storage data easy access to the easiest access system.

Types of cyber criminals traditional criminals and thieves hackers and computer trace passer, password hacker malicious code writer and distributor music, film and software pirate harassment and forcibly recovering, ethnic criminals and other cyber sexual criminals, educational deceptive ethnic -based gangs, organized criminals, government and independent spy -terrorist

How Cyber ​​Criminals work very professional and organized, not spontaneous – ground work required, coders, children, drops, crowds

Classification of cyber crimes

Crime against individual

  • Email is the creation of email messages by copying the identity of the spoofing mail correspondent. This shows that it is actually different from the place where it originates.
  • E-mail spam is a message also known as junk mail; Send with a web link or business offer. Clicking on this link or answering the commercial proposal sent to the fishing website or set up malware in your workstation.

Crime against individual cyber defamation

The task of accusing a person, whose aim is to underestimate or ignore it or ignore it or to make him a character of hatred, disrespect or ridicule. Cyber ​​Stocking: Stocking means “chasing secretly” to keep an eye on a person’s activities on the Internet, posting messages (sometimes threatened) on the bulletin board often seen by the victim, entering the chat-room seen by the victim, constantly attacking the victim with frequent emails, etc.

Crime against property

  • Credit card fraud: Online fraud and frauds are the highest amount of money that is growing in cyber sector nowadays.
  • Intellectual Property Crime: Crime against property
  • Internet time theft comes under internet time theft. This is the use of internet hours paid by another person by an informal person. Any illegal work that the owner is completely or partially denied by his human rights is a crime. Very common forms of IPR misuse – software theft, copyright violations, trademarks and service mark violations, theft of computer source code, etc.

Crime against property

  • Internet time theft: Internet time theft comes under hacking. This is the use of internet hours paid by another person by an informal person.

Crime against organization

  • Unauthorized access: It is usually represented as ‘hacking’.
  • Service rejected attack: Service rejection refers to the act by which user refuses to use service or website of service. Criminals target web servers of websites and send a large number of requests to that server. The maximum bandwidth of the website is used, and it slows down or not available for some time.
  • Virus attack: Computer virus is a type of malware, which, when executed, creates replication by implanting themselves in other computer programs, data files or boot sectors of other computer programs, data files or hard drives.
  • Email bombing: In email bombing, a user sends a large number of emails to the target address and causes that email address or mail server crashes.
  • Salute attack: When small attacks together become a major attack, which is not detected due to its nature. It is also called salute slicing.
  • Logic bomb: A piece of code intentionally inserted into a software system that will initiate mischievous features under certain circumstances.
  • Trojan Horse: Non-welf-duplicate types of malware program that involves malicious code, which when implemented performs actions determined by the nature of Trojan, which usually causes data damage or theft, and possibly damage the system.
  • Data Didling: Data is an illegal amendment of Diding data. He can be a victim of data deedal when a person records some data in his system and is different from output input. This is performed by a virus program that changes the data recorded.

Crime against society

  • Cyber ​​terrorism: Difference between cyber terrorism and cyber crime. Both are criminal acts. (1) to fear the public or any section of the public; Or (2) adversely affect harmony between various religious, racial, linguistic or regional groups or castes or communities; Or (3) to pressurize or control the government established by law; Or (4) To endanger the sovereignty and integrity of the nation.
  • Web Jacking: The word ‘web jacking’ comes from kidnapping. In this type of cyber crime, cyber criminals hack the control of a website. They may be able to change the content of that website. They use that website as the owner and the real owner of the website has no control over the website. Sometimes the attackers ask for ransom from the owner of the website.

Types of Cyber ​​Crime

  • Financial Crime
  • Finance and Fraud
  • Information Stolen
  • Cybercrhassment Recovery
  • Drug Smuggling
  • Weapons and illegal goods/activities
  • Cyber ​​pursuing
  • Cyber ​​pursuit
  • Dissemination of vulgar or objectionable materials
  • Defamation
  • Cyber ​​Terrorism
  • Cyber ​​Terrorism
  • Cyber ​​Terrorism
  • Refusal of Cyber ​​War
  • Refusing Services

Cyber ​​Crime Techniques

  • Dampster Diving – Treasury in Garbage
  • Wire Tapping – Insmanit Network Insmanit
  • Listening on Emissions – Listening on Emissions – Listening to Signal Removal
  • Refusal to Service Harassment
  • Software Theft
  • Session Kidnapping

Risk Management

  • Recruitment of Risk Management
  • Identification of important information assets, assessing risks, dangers and weaknesses faced by these assets, estimating the impact of these risks and the process of initiating the retaliation

Safety Control

  • Safety Control
  • Safety Controls specified, design, implemented and maintain
  • Safety Management Infrastructure – ISO/IEC 27002 What does “what does”:
  • Preventive Control
  • System Control
  • Frequency Control
  • Corrective Control: Control “What is”
  • Physical Control
  • Technical Control
  • Technical Control
  • Administrative Control

Preventive Control

  • Physical Control – Backup Files, Security Guard, Fence, Baige Systems, Double Door Systems, Locks and Chhabis, Fire Fire Equipment
  • Technical Control – Access Control Software, Antivirus Software, Password, Smart Card
  • Administrative Control – Safety Control – Safety Awareness and Technical Training, Slocation of Duties, Supervision of Duties

Steering Control

  • Physical Control- CCTV
  • Technical Control- Infiltration Local Rencing

Corrective Control

  • Physical Control- CCTV
  • Technical Control- All systems are filled with anti-virus software systems
  • Administrative Control- Action on Safety Audit Conclusions

Other Control

  • Preventive Control – Security Guard with Gun, Torn Wire Fence, Penal Policy
  • Recovery Control – Backup for System
  • Backup for System
  • Compensation Control – When General Control Fails – Log Report Review, Administrator’s activities review
  • Instructions Control – Cryptography
  • Encryption

Read Also:

  1. Cyber Crime / Part -Time Job / Pongi Scheme Scam Through Fraud / Investment
  2. What Does Intruder Means
  3. Cyber Crime Against Women And Children
  4. Fraud In Mobile Financial Services: Safety Of Consumers, Providers And Systems
  5. Disability And Pension Benefits
  6. Health Care Fraud
  7. Online Romance Scam
  8. Causes And Types Of Cyber Crimes
  9. Something About Cyber Crime
  10. Big Awareness Alert: Fraudulent Contact Numbers And Playboy Job Scams In India
  11. Cyber Crime In India
  12. Cyber Fraud And Fraud Types You Should Be Aware
  13. Fraud And Scams
  14. Prevention Of Cyber Financial Fraud Scams: Role And Responsibility Of International Organizations
  15. Fraud Scams
  16. Common Types Of Health Fraud Scams
  17. Skokka, Oklute And Locanto Platforms Sex Romance Frauds Scams Are Increasing Day By Day
  18. Real History Frauds And Scams Of BJP Government
  19. Preventive Measures From Matrimonial Fraud And Scams
  20. What Are Matrimonial Frauds and Scams
  21. Types Of Scams And Frauds
  22. Types Of Frauds And Scams
  23. What Are Fraud And Scams
  24. Artificial Intelligence: How Fraud Happens Through Voice, How To Avoid It
  25. Immediate Requirement Of Judicial Reforms To Deal With Financial Fraud And To Ensure Compensation For Victims
  26. Bribery And Threats After Online Dating Or Romance Scams
  27. Public Warning: Beware Of Online Dating And Romance Scams Connected To These Bank Accounts
  28. ED Enforcement Direactorate (ED) Department Action On Anil Ambani Companies Completed: Raids At 35 Places In 3 Days; ₹ 3000 Crore Loan Fraud Allegations
  29. Investigation Of India Digital Financial Scenario: A Comprehensive Study Of Cyber Fraud Trends And Digital Literacy In India
  30. Fraud Scam Of Escort Agencies

 

 

 

152330cookie-checkCyber Security/Crime
Sunil Saini

Recent Posts

Does Using Airpods For A Long Time Cause Brain Cancer

If you also use earphones or AirPods all the time, then be careful. Further let…

56 years ago

Does Excessive Use Of Airpods Cause Brain Tumors? What Does Research Say, How Much Sound Is Limited, Know Everything

Youth lives not possible nowadays without gadgets. But if you use AirPods too long, it…

56 years ago

Hidden Dangers Of Earbuds And Headphones

Most people consider music to be an important part of their day, which starts as…

56 years ago

Science And Technology

In this article we have provided information about science and technology. The information given here…

56 years ago

Important Information About Technology

In this article we have provided information about technology. The information given here will prove…

56 years ago

Role Of Computer And Internet In Our Life

In this article we have provided information about essay on role of computer and internet…

56 years ago