This website uses cookies to ensure you have the best experience. Learn more

Cyber Crime The New Age Devil

1279 words - 6 pages

The term ‘cyber crime’ seems a misnomer and has nowhere been clearly defined in any statute /Act passed or enacted by the Indian Parliament. Cyber Crime can be broadly defined as “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes” There is apparently no distinction between cyber and conventional crime. However, demarcation lies in the involvement of the medium mostly virtual one like computers and sometimes electronic such as mobile phones, in cyber crimes.
In the first place, let us see few causes that make cyber crimes possible.
1. Storage of data in comparatively small space on ...view middle of the document...

The reason may be to fulfil their political bias, fundamentalism, etc. The Pakistanis are said to be one of the best quality hackers in the world. They mainly target the Indian government sites with the purpose to fulfil their political objectives.
3. Professional hackers / crackers: Their work is motivated by the lure of easy money. These kinds of hackers are mostly employed to hack the site of the rivals and get credible, reliable and valuable information.
4. Discontented employees : This group include those people who have been either sacked by their employer or are dissatisfied with their employer. To avenge they normally hack the system of their employee
Some of the common ways of committing Cyber Crimes are as below.
1. Unauthorized access to computer systems or networks: This is normally called hacking but can be beyond hacking wherein the criminal uses official routes to gain access but with a ulterior motive.
2. Theft of information contained in electronic form- : This includes information stored in computer hard disks, removable storage media etc. Theft may be either by appropriating the data physically or by tampering them through the virtual medium.
3. Email bombing : This kind of activity refers to sending large numbers of mail to the victim, which may be an individual or a company or even mail servers there by ultimately resulting into crashing.
4. Data diddling : This kind of an attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed.
5. Salami attacks : This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed. Eg. the Ziegler case wherein a logic bomb was introduced in the bank’s system, which deducted 10 cents from every account and deposited it in a particular account.
6. Virus / worm attacks : Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Unlike viruses, the worms slowly eat up the entire data.
7. Trojan attacks : This term has its origin in the word ‘Trojan horse’. In software field this means an unauthorized programme, which passively gains control over another’s system by representing itself as an authorised programme. The most common form of installing a Trojan is through e-mail.
8. Web jacking- In these kinds of offences the hacker gains access and control over the web site of another. He may even mutilate or change the information on the site. This may be done for fulfilling political objectives or for money. Eg. recently the site of MIT (Ministry of Information Technology) was hacked by the Pakistani hackers and some obscene matter was...

Other Essays Like Cyber Crime the New Age Devil

New Dimensions In Privacy: Spatial Privacy In The Geographic Information Age

3148 words - 13 pages New Dimensions in Privacy: Spatial Privacy in the Geographic Information Age Abstract: The conceptualization of privacy as a right in the United States has most decidedly been an evolutionary work in process throughout much of the 20th century. There is some indication, however, that it has been more of a revolutionary process than an orderly evolution. According to Berry and Linoff, (1997), "Now is the era of another industry revolution

Cyber Crime Trends Essay

1821 words - 8 pages Cyber-Crime Trends Melody Ann Lovelace CJA570 October 10, 2011 Ray Gagne Cyber-Crime Trends In the dawn of the 21st century, the evolution of new technology and science concepts have made changes to everyone’s daily life. Cyber-crimes are a creature that did not exist 15-plus years ago. Back in the day, before technology, were only the conventional crimes such as illegal behaviors people thought were criminal behaviors. However, in

Cyber Crime

558 words - 3 pages It is generally seen that the use of internet in any country of the world is growing rapidly. It has given rise to new opportunities in every field we can think of, such as entertainment, business, sports, health or education. However, one of the major disadvantages of internet is cyber crime. which is an illegal activity that committed on the internet and this includes email espionage, credit card fraud, spam’s, software piracy download illegal

Cyber Terrorism

1587 words - 7 pages Truman R Miller 18 April 2014 Cyber Terrorism in the Age of Modern Technology In June of 1983 a movie produced by MGM called, “WarGames” (1-1983) set off one of the most intriguing films based in what was considered the beginning of the age of home based computers. WarGames despite the obvious age of the technology, gives us an inside look into its paranoid Cold War opening tensions to the staggering moral climax. Directed by John Badham

Examine How the Media Causes Crime -21 Marks

1195 words - 5 pages harder for the media to create panics about them. On the contrary, the arrival of new types of media is often met with a moral panic. The arrival of the internet has led to fears of cyber- crime. In fact, Jewkes notes, the Internet creates opportunities to commit both “conventional crime”, such as fraud. Wall identifies four categories of cyber-crime: cyber- trespass, cyber-deception and theft, cyber-pornography and cyber-violence. Cyber

Cyber Bullying in Today’s World

2142 words - 9 pages also suggested that females are more likely than males to partake in the cyber bullying, whereas males prefer to do the traditional type of bullying. However both males and females can be both perpetrators and victims. Cyber bullying does not take preference over one gender. In today’s age, we learn at an early age how to use computers and cell phones. We learn that it opens up possibilities for developing new friendships and hanging on to old

Cyber Security

2577 words - 11 pages essential part of everyday lifo, this is especiall y important with the use of the World Wide Web and the plentiful resources it has to offer. With these new advances of technology we often find an apparent generation gap where more and more Americans arc born into new technology 1hi lc others arc still trying lo figure it ou t. Most impo11 y. with these tech nological advances. crime has adapted to thi s new age as antl well. Consumers are pu t

Cyber Terrorism

787 words - 4 pages in doing so. New York State has laws against cyber-crime. Unauthorized use of computers is a class A misdemeanor, computer tampering in fourth degree is a class A misdemeanor, which can be up to one year in prison. Computer tampering in the third degree, unlawful duplication of computer related material, or criminal possession of computer related material is a class E felony. Criminals who have a felony charge can look up to 50 years or ore in

Cybersecurity Standards: a Case Study on Malaysian Banking Sector

1977 words - 8 pages disappeared EVERYTHING IS EVERYWHERE Organizations continue to move to new platforms including cloud, virtualization, mobile, social business and more ATTACK SOPHISTICATION The speed and dexterity of attacks has increased coupled with new actors with new motivations from cyber crime to terrorism to state-sponsored intrusions Copyright © 2013 CyberSecurity Malaysia What steps are taken by the Malaysian Government to keep

Cyber Bullying

883 words - 4 pages required to have an account and cyber bully in the first place, yet many young users are doing so more and more each day. With the new advances in technology, it is becoming astoundingly more easy to cyber bully anywhere. Many teens are constantly spending time on their cell phones, which before, the internet was only accessible by a computer. So cyber bullying can actually happen anywhere, at anytime, and by anybody. Weirdly enough, there are

Network Security

1925 words - 8 pages has no place in cyber security and clearly expressed that “Lawyers have raised so many legal questions that our military is not only unable to fight, but cannot even plan effectively for a war in cyberspace.”(Baker, 2012). Most scholars agree that when it comes using force for cyber attacks, international law rules won’t fit the bill and therefore would have to be changed. Still others believe that crime and espionage should be the main focus

Related Papers

Living In The Age Of Cyber Attacks And Cyber Warfare

2381 words - 10 pages Living in the Age of Cyber Attacks and Cyber Warfare UMUC   If you asked the average person on the street about cybersecurity and cyber warfare, they would probably say they don’t know much about it other than the fact that it involves computers. In fact, for anyone outside of the cybersecurity industry, the closest thing to cyber warfare that they may have experienced was their viewing of the movie War Games, or the fourth installment

Cyber Communism: The New Threat In The New Millennium

1404 words - 6 pages threat comes from the digerati's members who can be duped into supporting an economically unfeasible development method. Subversion is already in progress. "Hacker"[22] originally meant highly skilled programmer. Eric Raymond's "How to Become a Hacker"[23] redefines "hacker" as a programmer who supports open source. Robert Lemos' "The New Age of Hacktivism"[24] observes hacking being done for political reasons. Still, halting cyber

The New Age Of Motherboards Essay

1360 words - 6 pages The New Age [pic]Motherboards I, Shubhankar have taken the example of ASUS P7H57D-V EVO or simply known as Intel H57 Express Chipset. But first we will discuss about normal motherboards. The primary component of a computer is the motherboard. The motherboard is the hub which is used to connect all of the computer's essential components. As its name suggests, the motherboard acts as a parent board, which takes the form of a large printed circuit

Marketing In The Age Of New Media

979 words - 4 pages Marketing in the age of new media Bransonspeak | Richard Branson We’ve been trying to find a way to improve communication with our customers, but neither our website nor our Facebook page is producing results. What would you suggest? – Billy Loaiza Rivera, Medellin, Colombia This is a question keeping many chief executives and company founders awake at night as they struggle to keep up with rapid changes in the digital world. The swift rise