Computer Crimes



Computer crimes have become a rapidly growing and serious problem today. Some crimes use computers as tools.

Ex:
  • manipulate records
  • Counterfeit money and documents
  • Commit fraud via telecommunication links
  • Make unauthorized electronic transfers of money.

            Identity theft is a crime in which an imposter obtains key pieces of personal identification information to impersonate someone else. They use that information to obtain credit, merchandise and services in the name of the victim or to provide the thief with false credentials.

Some types of computer crimes are,

Malicious software

            Is any software that gives partial to full control of your computer to do whatever the malware creator wants. Malware can be a virus, worm, Trojan, adware, spyware, rootkit, etc.
Most malware requires the user to initiate its operation. Some vectors of attack include an attachment in e-mails, browsing a malicious website that installs software after the user clicks ok on a pop-up, and from vulnerabilities in the operating system or programs. Malware is not limited to one operating system.

 Hacking and cyber vandalism

            A person who enjoys computer technology and spends time learning and using computer system is known as a hacker. And a person who attempts to gain unauthorized or illegal access to computer systems to steal a password, corrupt files and programs, or even transfer money is called a cracker (criminal cracker)
Cyber vandalism is a form of vandalism that is carried out, or committed, using a computer, and against electronic information. Attacks of social media pages are also considered as cyber vandalism, although the content of social media updates may also contribute to cyber terrorism charges.

 Snooping and Sniffing

Spoofing attack is a situation in which one person or program masquerades as another by falsifying data for illegitimate advantage.
            Packet sniffing is gathering information when those passing through a network.so it is a connection between a user’s computer and the webserver. And it is difficult to detect packet sniffers because their function is to capture network traffic as they do not manipulate the data stream. The use of a Secure Socket Layer connection is the best way to ensure that attackers utilizing packet sniffers cannot steal sensitive data.

 Denial of service attacks

Denial of service attacks is used to overload a server and render it useless. Here the attacker will install a virus or Trojan software onto an abundance of user’s computers and instruct them to perform the attack on a specific server.
Competitors use Denial of service attacks to interrupt the service of another E-Commerce retailer or to bring down a web server for the purpose of disabling some type of security feature. Once the server is down they may have access to another functions of a server, such as database or a user’s system.

Phishing

Phishing is attempting to obtain account credentials through fake emails or websites but those seem superficial to come from legitimate sources. It is luring of sensitive information like passwords, credit card numbers from user by using a fake site that appears to be from a trustworthy source.
In above I have mentioned some details about computer crimes and I think you would be able to get some knowledge about computer crimes.

Cheers!
                                                                                      Thank you



Comments

Popular posts from this blog

What is Rapid Application Development

OOP Concepts