0% found this document useful (0 votes)
18 views4 pages

Wa0000

Uploaded by

ychannel72108
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views4 pages

Wa0000

Uploaded by

ychannel72108
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Cyber Crime

Cyber crime is defined as a criminal activity where a computer network is used as a


medium, target, or place for committing a crime. It involves the use of information
technology, and traditional crimes like fraud, blackmail, and forgery can be executed
with the help of computers or networks.

Categories of Cyber Crime

1. Financial Attacks: These focus on attacking banks or financial institutions for


monetary gain, such as hacking to obtain sensitive information like passwords
or PINs.
2. Business Attacks: These involve unauthorized access to a company's
confidential data for business advantage.
3. Military and Intelligence Attacks: These target sensitive military or
intelligence data, aiming to compromise national security.
4. Terrorist Attacks: These involve using computers and networks to conduct
terrorist activities.
5. Grudge and Trill Attacks:
o Grudge Attacks: Motivated by revenge, often by an employee against
their employer due to perceived mistreatment or other issues.
o Trill Attacks: These are conducted purely for fun and not out of malice
or revenge.

Common Cyber Crimes

1. Denial of Service (DoS) Attack:


o This attack aims to make a computer or network resource unavailable to
its users by overwhelming it with a large amount of traffic.
o By flooding the target with excessive requests, legitimate access is
blocked, making the service unavailable.
o A specialized form of this attack is called Distributed Denial of Service
(DDoS), where multiple computers are used to launch a coordinated
attack against one or more targets. This often involves a master program
that controls several agent computers to send the attack traffic.
2. Software Piracy:
o Refers to the unauthorized copying, distribution, or use of software.
o Legal software typically requires a license for use, and unauthorized
copying without permission is considered piracy.
o Common methods of software piracy include using single-licensed
oftware on multiple computers, using a key generator (keygen) to bypass
activation, or posting licensed software online for illegal download.
o Despite efforts by companies to protect their software with copy-
protection mechanisms, piracy remains difficult to stop.

Common Software Piracy Terminologies:


 Crack: A crack is a version of software that has been illegally modified to
bypass copyright protection. This is done to remove restrictions like encoded
copy prevention.

 Hack:

 Defined as the act of bypassing the copy protection of software to create an


illegal or unauthorized version.

 Hardware Locking:

 A method to prevent software privacy by tying the software license to specific


computer hardware.
 Uses "hardware locks" or "dongles" that connect to a computer and verify the
software's authenticity.
 Example given: A hardware lock might limit the software to work only on a
particular hard drive, making it unusable on other computers.

 Key Generators (KeyGen):

 Software tools used to create unauthorized registration keys or serial numbers


for software.
 They bypass copy protection and enable the illegal use of a software program.

 Serials:

 Refers to registration or serial keys (often obtained illegally) that are required to
unlock a trial or evaluation version of software.

 Phishing:

 Derived from "fishing," phishing is the act of creating a fake website that looks
like a real, trusted one to deceive users.
 The goal is to trick users into providing sensitive information like passwords,
bank details, etc., which can be used for fraudulent transactions.
 Phishing often involves sending emails that redirect users to these fake sites,
where they unknowingly submit personal information.

 Spoofing of Internet Protocol (IP) Addresses:

 This involves manipulating IP addresses to mislead receivers about the sender's


identity, making them think the message is from a different source.
 IP spoofing is often used in Denial-of-Service (DoS) attacks, where the goal is
to overwhelm a system or network.

 Hacking:

 Describes the act of accessing a computer system or network without


authorization.
 Hackers can gain unauthorized access to files, applications, or even entire
systems.
 Hacking often involves exploiting security vulnerabilities and is used to steal,
alter, or destroy data.
 The distinction between "hacking" and "cracking" is noted, with cracking
typically referring to intentionally breaking into systems with malicious intent.

 Virus Dissemination:

 Refers to the spread of computer viruses, which are malicious programs


designed to damage or disrupt computer operations.
 A virus can replicate itself and infect files or applications, spreading through
networks, downloads, or removable media like USBs.
 Virus dissemination involves the intentional or unintentional spread of viruses,
which can lead to widespread computer damage.

 Cyber-Stalking:

 The use of the internet or electronic means to stalk, harass, or intimidate


someone.
 This behavior may include harassment through messages, phone calls, identity
theft, or spreading false information about the victim.
 Cyber-stalking often involves monitoring the victim’s online activities and
sending threatening or harassing content.

 Rogue Code:

 Malicious software that records a user’s keystrokes (keylogging) and sends this
information to an unauthorized server.
 Rogue code can also include software designed to delete files, damage system
applications, or disrupt normal operations.

 Child Pornography:

 Describes the illegal and exploitative use of the internet to access and distribute
sexually explicit content involving minors.
 This is a highly serious offense and represents a significant misuse of internet
technology for criminal activities.

 Cyber Terrorism:

 Refers to the use of the internet by individuals or groups to carry out attacks or
threats against people, groups, or entire countries.
 Cyber terrorists exploit the anonymity provided by the internet to plan and
execute acts intended to cause harm, panic, or disruption, often targeting critical
infrastructure or government systems.

Cyber-Bullying
 Described as intentional, repeated, and antisocial behavior aimed at harming an
individual or a group using digital means (e.g., mobile phones, computers,
internet).
 An example includes continuously sending unwanted emails to a victim who
does not wish to engage.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy