SlideShare a Scribd company logo
1 of 2
Download to read offline
tech navigator

                                                                                         Property related crimes are a few categories
                                                                                         under which of cyber crimes are classified
                                                                                         into.

                                                                                         The Indian Information Technology Act
                                                                                         (2000) is primarily meant to legislation to
                                                                                         promote e-commerce and lacks the teeth
                                                                                         to handle cyber crime effectively. To add
                                                                                         to this, our law enforcement authorities are
                                                                                         quite inept to handle this new type of crime
                                                                                         and criminals.

                                                                                         Some Cyber crimes that we frequently hear
                                                                                         about are

                                                                                             Unauthorised access to
                                                                                               computer systems
                                                                                         This broadly falls into the term hacking.
                                                                                         Unauthorized use, or attempts to
                                                                                         circumvent or bypass the security
                                                                                         mechanisms of an information system or
                                                                                         network is termed as hacking.

                                                                                                    Email Bombing
                                                                                         Email bombing is characterized by abusers
                                                                                         repeatedly sending an email message to a
                                                                                         particular address at a specific victim site.
                                          T      HE increased use of computers and
                                                 the Internet has given raise to a new
                                          breed of criminals – Cybercriminals.
                                          Wikipedia defines Cybercrime as a term
                                                                                         Most cases this is designed to chock
                                                                                         bandwidth and to exhaust existing system
                                                                                         resources so as to bring down the system
                                          used broadly to describe activity in which     or the service that the system provides. This
                                          computers or networks are a tool, a target,    may inturn lead to a denial-of-service attack.
                                          or a place of criminal activity.
                                                                                         Email spamming is a variant of bombing;
                                          In 1820, Joseph-Marie Jacquard, a textile      it refers to sending email to hundreds or
                                          manufacturer in France, produced the           thousands of users (or to lists that expand
          By Gerard Sylvester
                                          loom. This device allowed the repetition       to that many users). Email spamming can
                                          of a series of steps in the weaving of         be made worse if recipients reply to the
                                          special fabrics. This resulted in a fear       email, causing all the original addressees to
                                          amongst Jacquard’s employees that their        receive the reply.
                                          traditional employment and livelihood were
                                          being threatened. They committed acts of        VIRUS/Trojan horse/Worms
                                          sabotage to discourage Jacquard from           A computer virus is a computer program
                                          further use of the new technology. This,       that can copy itself and infect a computer
                                          they say, is the first recorded cyber crime!   without permission or knowledge of the
                                                                                         user. The original may modify the copies
                                          Distributed Denial of Service (DDOS),          or the copies may modify themselves, as
                                          Email Bombing, VIRUS, Unauthorized             occurs in a metamorphic virus. A virus can
                                          access, Cyber stalking, Email/Website          only spread from one computer to another
                                          Spoofing, Pornography and Intellectual         when its host is taken to the uninfected

                                                                                                                  [turn on page 47]

                                Gerard Sylvester can be reached at sylvester_26@yahoo.com
Page 40      SAMACHAR July-August 2007




            PDF Created with deskPDF PDF Writer - Trial :: http://www.docudesk.com
[from page 44]


 computer, for instance by a user           will never manifest itself in the physical
 sending it over a network or carrying      sense but this does not mean that the
 it on a removable medium such as a         pursuit is any less distressing. There are
 floppy disk, CD, USB drive or by           a wide variety of means by which
 the Internet.                              individuals may seek out and harass
                                            individuals even though they may not
         Data Diddling                      share the same geographic borders, and
 Data diddling involves changing data       this may present a range of physical,
 prior or during input into a computer.     emotional, and psychological
 In other words, infor mation is            consequences to the victim.
 changed from the way it should be
 entered by a person typing in the                Child Pornography
 data, a virus that changes data, the       Child Pornography is a part of cyber
 programmer of the database or              pornography but it is such a grave
 application, or anyone else involved       offence that it is individually also
 in the process of having information       recognized as a cyber crime. The
 stored in a computer file. The culprit     Internet is being highly used by its
 can be anyone involved in the              abusers to reach and abuse children
 process of creating, recording,            sexually, worldwide. The Internet
 encoding, examining, checking,             explosion has made the children a viable
 converting, or transmitting data.          victim to the cyber crime. As more
 This is one of the simplest methods        homes have access to Internet, more
 of committing a computer-related           children would be using the Internet
 crime, because it requires almost no       and more are the chances of falling
 computer skills whatsoever. Despite        victim to the aggression of pedophiles.
 the ease of committing the crime,          The pedophiles use their false identity
 the cost can be considerable.              to trap children and even contact them
                                            in various chat rooms where they
         Salami Slicing                     befriend them and gain personal
 Salami slicing is the illegal practice     information from the innocent preys.
 of stealing money repeatedly in            They even start contacting children on
 extremely small quantities, usually by     their e-mail addresses. These pedophiles
 taking advantage of rounding to the        drag children to the net for the purpose
 nearest cent (or other monetary unit)      of sexual assault or so as to use them
 in financial transactions. It would be     as a sex object.
 done by always rounding down, and
 putting the fractions of a cent into             Cyber Defamation
 another account. Salami slicing is         Any derogatory statement, which is
 most often performed by employees          designed to injure a person’s business
 of the corporation that handles those      or reputation, constitutes cyber
 transactions, and, if not guarded          defamation. Defamation can be
 against, it can be difficult to detect.    accomplished as libel or slander. Cyber
                                            defamation occurs when defamation
         Cyber Stalking                     takes place with the help of computers
 Cyberstalking, which is simply an          and / or the Internet. E.g. someone
 extension of the physical form of          publishes defamatory matter about
 stalking, is where the electronic          someone on a website or sends e-mails
 mediums such as the Internet are           containing defamatory information to
 used to pursue, harass or contact          all of that person’s friends.Be a safe
 another in an unsolicited fashion.         Netizen! (a portmanteau of Internet
 Most often, given the vast distances       and citizen).
 that the Internet spans, this behavior                       ***

                                           SAMACHAR July-August 2007             Page 43

More Related Content

What's hot

Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineFtlwood Families
 
How prevent dos
How prevent dosHow prevent dos
How prevent dossnake9991
 
Ddos attack definitivo
Ddos attack definitivoDdos attack definitivo
Ddos attack definitivolilith333
 
3852_wlan_revised
3852_wlan_revised3852_wlan_revised
3852_wlan_revisedBalaji Ravi
 
Sis tue 0845 joseph rosenbaum
Sis tue 0845 joseph rosenbaumSis tue 0845 joseph rosenbaum
Sis tue 0845 joseph rosenbaumMediaPost
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in ManetIRJET Journal
 

What's hot (6)

Cyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_onlineCyber opsec protecting_yourself_online
Cyber opsec protecting_yourself_online
 
How prevent dos
How prevent dosHow prevent dos
How prevent dos
 
Ddos attack definitivo
Ddos attack definitivoDdos attack definitivo
Ddos attack definitivo
 
3852_wlan_revised
3852_wlan_revised3852_wlan_revised
3852_wlan_revised
 
Sis tue 0845 joseph rosenbaum
Sis tue 0845 joseph rosenbaumSis tue 0845 joseph rosenbaum
Sis tue 0845 joseph rosenbaum
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 

Viewers also liked

Viewers also liked (9)

PhilAgriNet
PhilAgriNetPhilAgriNet
PhilAgriNet
 
Google Hacking
Google HackingGoogle Hacking
Google Hacking
 
CIARD
CIARDCIARD
CIARD
 
Presentation at Witfor 2009
Presentation at Witfor 2009Presentation at Witfor 2009
Presentation at Witfor 2009
 
Web 2.0 & Social Media
Web 2.0 & Social MediaWeb 2.0 & Social Media
Web 2.0 & Social Media
 
D Space Installation
D Space InstallationD Space Installation
D Space Installation
 
Synthesis from the forum on ICT and Agriculture in the Context of Green Growth
Synthesis from the forum on ICT and Agriculture in the Context of Green GrowthSynthesis from the forum on ICT and Agriculture in the Context of Green Growth
Synthesis from the forum on ICT and Agriculture in the Context of Green Growth
 
Reusable Learning Objects
Reusable Learning ObjectsReusable Learning Objects
Reusable Learning Objects
 
The World Cafe
The World CafeThe World Cafe
The World Cafe
 

Similar to Cyber Crime

Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 

Similar to Cyber Crime (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
An overview of cyberimes
An overview of cyberimesAn overview of cyberimes
An overview of cyberimes
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 

More from Gerard Sylvester

Digital Technologies to Improve Value Chain Efficiency
Digital Technologies to Improve Value Chain EfficiencyDigital Technologies to Improve Value Chain Efficiency
Digital Technologies to Improve Value Chain EfficiencyGerard Sylvester
 
Digitalization to transform African Agriculture
Digitalization to transform African AgricultureDigitalization to transform African Agriculture
Digitalization to transform African AgricultureGerard Sylvester
 
Digital Agriculture: Trends and Challenges
Digital Agriculture: Trends and ChallengesDigital Agriculture: Trends and Challenges
Digital Agriculture: Trends and ChallengesGerard Sylvester
 
Data Ownership and Privacy
Data Ownership and PrivacyData Ownership and Privacy
Data Ownership and PrivacyGerard Sylvester
 
E-agriculture Trends and Challenges
E-agriculture Trends and ChallengesE-agriculture Trends and Challenges
E-agriculture Trends and ChallengesGerard Sylvester
 
Semantic Web Tools For Agricultural Materials
Semantic Web Tools For Agricultural MaterialsSemantic Web Tools For Agricultural Materials
Semantic Web Tools For Agricultural MaterialsGerard Sylvester
 

More from Gerard Sylvester (11)

Digital Technologies to Improve Value Chain Efficiency
Digital Technologies to Improve Value Chain EfficiencyDigital Technologies to Improve Value Chain Efficiency
Digital Technologies to Improve Value Chain Efficiency
 
Digitalization to transform African Agriculture
Digitalization to transform African AgricultureDigitalization to transform African Agriculture
Digitalization to transform African Agriculture
 
Digital Agriculture: Trends and Challenges
Digital Agriculture: Trends and ChallengesDigital Agriculture: Trends and Challenges
Digital Agriculture: Trends and Challenges
 
Data Ownership and Privacy
Data Ownership and PrivacyData Ownership and Privacy
Data Ownership and Privacy
 
E-agriculture Trends and Challenges
E-agriculture Trends and ChallengesE-agriculture Trends and Challenges
E-agriculture Trends and Challenges
 
CIARD
CIARDCIARD
CIARD
 
e-Agriculture
e-Agriculturee-Agriculture
e-Agriculture
 
Effective Google Searches
Effective Google SearchesEffective Google Searches
Effective Google Searches
 
Semantic Web Tools For Agricultural Materials
Semantic Web Tools For Agricultural MaterialsSemantic Web Tools For Agricultural Materials
Semantic Web Tools For Agricultural Materials
 
Webservices
WebservicesWebservices
Webservices
 
Internet Presentation
Internet PresentationInternet Presentation
Internet Presentation
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Cyber Crime

  • 1. tech navigator Property related crimes are a few categories under which of cyber crimes are classified into. The Indian Information Technology Act (2000) is primarily meant to legislation to promote e-commerce and lacks the teeth to handle cyber crime effectively. To add to this, our law enforcement authorities are quite inept to handle this new type of crime and criminals. Some Cyber crimes that we frequently hear about are Unauthorised access to computer systems This broadly falls into the term hacking. Unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network is termed as hacking. Email Bombing Email bombing is characterized by abusers repeatedly sending an email message to a particular address at a specific victim site. T HE increased use of computers and the Internet has given raise to a new breed of criminals – Cybercriminals. Wikipedia defines Cybercrime as a term Most cases this is designed to chock bandwidth and to exhaust existing system resources so as to bring down the system used broadly to describe activity in which or the service that the system provides. This computers or networks are a tool, a target, may inturn lead to a denial-of-service attack. or a place of criminal activity. Email spamming is a variant of bombing; In 1820, Joseph-Marie Jacquard, a textile it refers to sending email to hundreds or manufacturer in France, produced the thousands of users (or to lists that expand By Gerard Sylvester loom. This device allowed the repetition to that many users). Email spamming can of a series of steps in the weaving of be made worse if recipients reply to the special fabrics. This resulted in a fear email, causing all the original addressees to amongst Jacquard’s employees that their receive the reply. traditional employment and livelihood were being threatened. They committed acts of VIRUS/Trojan horse/Worms sabotage to discourage Jacquard from A computer virus is a computer program further use of the new technology. This, that can copy itself and infect a computer they say, is the first recorded cyber crime! without permission or knowledge of the user. The original may modify the copies Distributed Denial of Service (DDOS), or the copies may modify themselves, as Email Bombing, VIRUS, Unauthorized occurs in a metamorphic virus. A virus can access, Cyber stalking, Email/Website only spread from one computer to another Spoofing, Pornography and Intellectual when its host is taken to the uninfected [turn on page 47] Gerard Sylvester can be reached at sylvester_26@yahoo.com Page 40 SAMACHAR July-August 2007 PDF Created with deskPDF PDF Writer - Trial :: http://www.docudesk.com
  • 2. [from page 44] computer, for instance by a user will never manifest itself in the physical sending it over a network or carrying sense but this does not mean that the it on a removable medium such as a pursuit is any less distressing. There are floppy disk, CD, USB drive or by a wide variety of means by which the Internet. individuals may seek out and harass individuals even though they may not Data Diddling share the same geographic borders, and Data diddling involves changing data this may present a range of physical, prior or during input into a computer. emotional, and psychological In other words, infor mation is consequences to the victim. changed from the way it should be entered by a person typing in the Child Pornography data, a virus that changes data, the Child Pornography is a part of cyber programmer of the database or pornography but it is such a grave application, or anyone else involved offence that it is individually also in the process of having information recognized as a cyber crime. The stored in a computer file. The culprit Internet is being highly used by its can be anyone involved in the abusers to reach and abuse children process of creating, recording, sexually, worldwide. The Internet encoding, examining, checking, explosion has made the children a viable converting, or transmitting data. victim to the cyber crime. As more This is one of the simplest methods homes have access to Internet, more of committing a computer-related children would be using the Internet crime, because it requires almost no and more are the chances of falling computer skills whatsoever. Despite victim to the aggression of pedophiles. the ease of committing the crime, The pedophiles use their false identity the cost can be considerable. to trap children and even contact them in various chat rooms where they Salami Slicing befriend them and gain personal Salami slicing is the illegal practice information from the innocent preys. of stealing money repeatedly in They even start contacting children on extremely small quantities, usually by their e-mail addresses. These pedophiles taking advantage of rounding to the drag children to the net for the purpose nearest cent (or other monetary unit) of sexual assault or so as to use them in financial transactions. It would be as a sex object. done by always rounding down, and putting the fractions of a cent into Cyber Defamation another account. Salami slicing is Any derogatory statement, which is most often performed by employees designed to injure a person’s business of the corporation that handles those or reputation, constitutes cyber transactions, and, if not guarded defamation. Defamation can be against, it can be difficult to detect. accomplished as libel or slander. Cyber defamation occurs when defamation Cyber Stalking takes place with the help of computers Cyberstalking, which is simply an and / or the Internet. E.g. someone extension of the physical form of publishes defamatory matter about stalking, is where the electronic someone on a website or sends e-mails mediums such as the Internet are containing defamatory information to used to pursue, harass or contact all of that person’s friends.Be a safe another in an unsolicited fashion. Netizen! (a portmanteau of Internet Most often, given the vast distances and citizen). that the Internet spans, this behavior *** SAMACHAR July-August 2007 Page 43