Cyber Crime Synopsis PDF
Cyber Crime Synopsis PDF
Cyber Crime Synopsis PDF
INTRODUCTION
Cybercrimes are defined as: "Offences that are committed against individuals or
groups of individuals with a criminal motive to intentionally harm the reputation
of the victim or cause physical or mental harm to the victim directly or indirectly,
using modern telecommunication networks such as Internet and mobile phones ".
Such crimes may threaten a nation’s security and financial health. Issues
surrounding these types of crime have become high-profile, particularly those
1
surrounding cracking, copyright infringement, child pornography, and child
grooming.
CYBER CRIMINALS:
2
Organised hackers-
These kinds of hackers are mostly organised together to fulfil certain
objective. The reason may be to fulfil their political bias, fundamentalism,
etc.
Professional hackers / crackers –
Their work is motivated by the colour of money.These kinds of hackers
are employed to hack the site of the rivals and get credible, reliable and
valuable information.
3
Normally in these kinds of thefts the Internet surfing hours of the victim
are used up by another person. This is done by gaining access to the login
ID and the password.
CLASSIFICATION:
4
Internet time theft:
The usage of the Internet hours by an unauthorized person which is
actually paid by another person.
(C) Cyber crime Against Organization
Denial of Service:
When Internet server is flooded with continuous bogus requests so as to
denying legitimate users to use the server or to crash the server.
Virus attack:
A computer virus is a computer program that can infect other computer
programs by modifying them in such a way as to include a (possibly
evolved) copy of it.
Web Jacking :
Hackers gain access and control over the website of another, even they
change the content of website for fulfilling political objective or for
money.
5
PREVENTION OF CYBER CRIME:
never send your credit card number to any site that is not secured,
to guard against frauds.
always keep back up volumes so that one may not suffer data loss
in case of virus contamination