Introduction To Cyber Crime
Introduction To Cyber Crime
Introduction To Cyber Crime
to cyber
crime
INTRODUCTION
The information technology act, 2000
was introduced in India to deal with
cases of cyber crime.
The present chapter covers difference
between conventional and cyber crimes,
the changing nature of cyber crimes
reasons for growing cyber crimes, cyber
criminals and the modes and manner in
which cyber crimes are taken place.
CYBER CRIME
Cyber crimes involves all criminal activities or
unlawful in which computer and its network are
either used as primary mean of commission or
become its target.
Thus any activity that uses computer as an
instrumentality target or a means for
perpetrating further crime, falls within the ambit
of cyber crime.
These include a plethora of illegal activities.
The term cyber crime is an umbrella term under
which many illegal activities may be grouped
together.
Evidence of Offences
Fake Identity
Length of investigation
Easy rescue
Force involved
CYBER CRIMINALS
,
Children and adolescents between
the age group of 6-18 years
Organized hackers
Professional hackers/crackers
Discontented employees
4.Data diddling
This kind of attack involves altering raw data just before a
computer processes it and then changing it back when it
processes is completed.
It involves changing data with malicious intentions during or
before feeding it into computer and provide undue advantage to
a specific party.
It also includes adding fraudulent input Data, altering input
Data, omitting the desired input data , wrongly posting a
trasaction making alteration
CASE STUDY
5.Salami attacks
This kind of crime is normally prevalent in the financial
institutions or for the purpose of committing financial crimes by
making small alterations that would not be easily notice. The
key here is to make the alteration so insignificant that in a single
case it would go completely unnoticed.
CASE STUDY
8.Trojan attacks
This term has its origin in the word. Trojan
house. It is an unauthorized computer
program that performs some apparently
useful function to represent itself as an
authorized program, but which also contains
malicious hidden code. These codes may
introduce a virus or other computer bug or it
may permit unauthorized access by an
outside users. The most common form of
installing a Trojan is through e-mail.
CASE STUDY