Module1 Cyber Security
Module1 Cyber Security
Module1 Cyber Security
Introduction to
Cybercrime
Introduction
Web Jacking
• Web jacking occurs when someone forcefully takes control of a website (by
cracking the password and later changing it).
Password Sniffing
Password Sniffers are programs that monitor and record the name and
password of network users as they login, jeopardizing security at a site.
Whoever installs the Sniffer can then impersonate an authorized user and
login to access restricted documents.
Identity Theft
Identity theft is a fraud involving another person’s identity for an illicit
purpose.
This occurs when a criminal uses someone else’s identity for his/her own
illegal purposes.
The cyberimpersonator can steal unlimited funds in the victim’s name without
Cyber Security by Nina Godbole/Sunit Belapure
the victim even knowing about it for months, sometimes even
Copyright 2011 Wiley for
India Pvt.years!
Ltd. All rights reserved.
Cybercrime: The Legal Perspectives
Computer Crime: Criminal Justice Resource Manual (1979)
The first comprehensive presentation of computer crime
computer-related crime was defined in the broader meaning as: any illegal act
for which knowledge of computer technology is essential for a successful
prosecution.
Cybercrime:
outcome of “globalization.”
Globalized information systems accommodate an increasing number of
transnational offenses.
This problem can be resolved in two ways:
1. Divide information systems into segments bordered by state boundaries
2. Incorporate the legal system into an integrated entity obliterating these state
boundaries