Computer Crimes
Computer
crimes have become a rapidly growing and serious problem today. Some crimes
use computers as tools.
Ex:
- manipulate records
- Counterfeit money and documents
- Commit fraud via telecommunication links
- Make unauthorized electronic transfers of money.
Identity theft is a crime in which
an imposter obtains key pieces of personal identification information to
impersonate someone else. They use that information to obtain credit,
merchandise and services in the name of the victim or to provide the thief with
false credentials.
Some types
of computer crimes are,
Malicious software
Is any software that gives partial
to full control of your computer to do whatever the malware creator wants. Malware
can be a virus, worm, Trojan, adware, spyware, rootkit, etc.
Most malware
requires the user to initiate its operation. Some vectors of attack include an attachment in e-mails, browsing a malicious website that installs software
after the user clicks ok on a pop-up, and from vulnerabilities in the operating
system or programs. Malware is not limited to one operating system.
Hacking
and cyber vandalism
A person who enjoys computer
technology and spends time learning and using computer system is known as a
hacker. And a person who attempts to gain unauthorized or illegal access to
computer systems to steal a password, corrupt files and programs, or even
transfer money is called a cracker (criminal cracker)
Cyber
vandalism is a form of vandalism that is carried out, or committed, using a
computer, and against electronic information. Attacks of social media pages are
also considered as cyber vandalism, although the content of social media updates
may also contribute to cyber terrorism charges.
Snooping
and Sniffing
Spoofing attack is a situation in which one person or program
masquerades as another by falsifying data for illegitimate advantage.
Packet sniffing is gathering
information when those passing through a network.so it is a connection between
a user’s computer and the webserver. And it is difficult to detect packet
sniffers because their function is to capture network traffic as they do not
manipulate the data stream. The use of a Secure Socket Layer connection is the
best way to ensure that attackers utilizing packet sniffers cannot steal
sensitive data.
Denial of
service attacks
Denial of service attacks is used to overload a server and
render it useless. Here the attacker will install a virus or Trojan software onto
an abundance of user’s computers and instruct them to perform the attack on a
specific server.
Competitors
use Denial of service attacks to interrupt the service of another E-Commerce
retailer or to bring down a web server for the purpose of disabling some type
of security feature. Once the server is down they may have access to another
functions of a server, such as database or a user’s system.
Phishing
Phishing is attempting to obtain account credentials through
fake emails or websites but those seem superficial to come from legitimate sources.
It is luring of sensitive information like passwords, credit card numbers from
user by using a fake site that appears to be from a trustworthy source.
In above I
have mentioned some details about computer crimes and I think you would be able
to get some knowledge about computer crimes.
Cheers!
Comments
Post a Comment