IndexWhat is Cyber CrimeWho is a HackerWho is a CrackerReasons for Cyber CrimeProtection from Cyber CrimeConclusionCyber crime is defined as crimes committed on the Internet using the computer as a tool or as a victim targeted by a hacker or a cracker. as we grow up on a system of fast data manipulation in this technological era, unfortunately, some skilled professionals use this ability in a negative way by harming society, finding vulnerabilities in company systems and addressing them, creating and distributing codes containing viruses. In this case the term “cybercrime” is a misnomer. Mainly the concept of cybercrime is not radically different from the concept of conventional crime. In recent years, privacy and ethical behavior have played an important role in our lives, especially in security-related areas. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an Original Essay What is Cybercrime Cybercrime is the recent and perhaps the most well-known problem in the cyber world. “Computer crime can be said to be that species of which the genre is the common crime, and in which the computer is the object of the behavior that constitutes crime” “Any criminal activity that uses a computer as a tool, target or as the means to maintaining further crimes fall within the circuit of cybercrime". One definition of computer crime may be "illegal acts in which the computer is a tool or a target or both." Computer can be used as a tool in the following financial crimes, sale of illegal items, pornography, intellectual property crimes, email spoofing, cyber stalking, forgery, cyber defamation. However, the computer can be the target of illegal acts in the following cases: unauthorized access to computer systems/computer networks, theft of information contained in electronic format, therefore e-mail bombing, data dilling, salami attacks, logic bombs, Trojan attacks, theft of time on the Internet, web jacking, theft of computer systems, physical damage to the computer system. Who is a Hacker There are hundreds of definitions of "hacker" on the Web. Combining everything together we get a computer enthusiast, who likes to learn programming languages and/or computer systems and can often be considered an expert in the subject, therefore who has a good skill in the art and science of making computers and software do much more than the original designers intended. “Hackers are computer experts. Hackers built the Internet. Thus hackers made the Unix operating system what it is today. So hackers run Usenet. Hackers make the World Wide Web work. So if you are part of this culture, if you have contributed to it and other people in it know who you are and call you a hacker, you are a hacker. Real hackers consider crackers lazy, irresponsible and unintelligent and want nothing to do with them. Unfortunately, many journalists and writers have been fooled into using the word "hacker" to describe "crackers", which obviously upsets real hackersWho is crackerA person who breaks into other people's computer systems for entertainment or who intends to cause damage is a “cracker”. A hacker is a very talented programmer, respected by his colleagues. On the other hand a real hacker can find plenty of useful projects to work on, permanently breaking things is more a characteristic of children of any age. Surely the fundamental difference is this: hackers build things; crackers break them.The reasons for cybercrimeNow "The Concept of Law" hasstated that “human beings are vulnerable, so the rule of law is needed to protect them.” So, applying this to cyberspace we could say that computers are vulnerable, therefore the rule of law is needed to protect and safeguard them from cybercrime. The reasons for the vulnerability of computers can be said to be: Ability to store data in a relatively small space: in The computer has the unique feature of storing data in a very small space. This allows removing or obtaining information via physical or virtual media making it much easier. Easy access: Furthermore, the problem encountered in protecting a computer system from unauthorized access is that there is every possibility of violation not due to human error but due to complex technology. With secretly implanted logic bombs, keyloggers capable of stealing passcodes, advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass firewalls can be used to overcome many security systems. Complex: Computers run on operating systems and these operating systems in turn are made up of millions of codes. The human mind is fallible and it is not possible for there not to be an error at any time. Cyber criminals take advantage of these loopholes and penetrate the computer system. Negligence: So negligence is closely linked to human behavior. It is therefore very likely that there is some negligence while protecting the computer system, which in turn allows a cybercriminal to gain access and control over the computer system. Loss of Evidence: Loss of evidence is a very common and obvious problem as all data is routinely destroyed. Further data collection outside the territorial scope also cripples this criminal investigation system. Types of Cyber Crimes: Email Bombing: In this type of activity it means sending large amount of mail to the victim, which can be an individual or a company or even mail server there, eventually causing a crash. Data modification: This type of attack involves altering the raw data just before a computer processes it and then modifying it once the processing is complete. The power company faced a similar data manipulation problem as the department was being computerized. Salami attacks: So, this type of crime is normally prevalent in financial institutions or with the purpose of committing financial crimes. An important feature of this type of crime is that the alteration is so small that it would normally go unnoticed. For example in the Ziegler case where a logic bomb was introduced into the bank's system that deducted 10 cents from each account and deposited it into a specific account. Denial of Service Attack: The victim's computer becomes flooded with more requests than it can handle, causing it to crash. Distributed Denial of Service (DDoss) attack is also a type of denial of service attack, where the offenders are numerous and widespread. Trojan Attacks: Obviously this term has its origins in the word "Trojan horse". In the software field this means an unauthorized program that passively gains control over another's system by masquerading as an authorized program. The most common form of Trojan installation is via email. For example, a Trojan was installed on the computer of an American director while she was chatting. The cybercriminal obtained her nude photographs through the web cam installed on the computer. He harassed this lady further. Theft of time on the Internet: in this type of theft the hours of Internet browsing are used.
tags