Friday, May 7, 2010

Types of Cyber Crime

Hacking:
The activity of breaking into a computer system to gain an unauthorized access is known as hacking. The act of defeating the security capabilities of a computer system in order to obtain an illegal access to the information stored on the computer system is called hacking. The unauthorized revelation of passwords with intent to gain an unauthorized access to the private communication of an organization of a user is one of the widely known computer crimes. Another highly dangerous computer crime is the hacking of IP addresses in order to transact with a false identity, thus remaining anonymous while carrying out the criminal activities.
Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.

2.2 Denial of Service Attack:
In a denial-of-service (DoS) attack, an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer.
The most common and obvious type of DoS attack occurs when an attacker "floods" a network with information. When you type a URL for a particular website into your browser, you are sending a request to that site's computer server to view the page. The server can only process a certain number of requests at once, so if an attacker overloads the server with requests, it can't process your request. This is a "denial of service" because you can't access that site.

An attacker can use spam email messages to launch a similar attack on your email account. Whether you have an email account supplied by your employer or one available through a free service such as Yahoo or Hotmail, you are assigned a specific quota, which limits the amount of data you can have in your account at any given time. By sending many, or large, email messages to the account, an attacker can consume your quota, preventing you from receiving legitimate messages.
A malicious attack on a computer or computer network that can take various forms. The targeted computer network is overwhelmed with massive amounts of useless traffic that can bring the network down. Some forms of attack have special names such as The Ping of Death and Teardrops.
This is an act by the criminal, who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.

Virus Dissemination:
Malicious software that attaches itself to other software. (Virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are examples of malicious software that destroys the system of the victim.
2.4 Software Piracy:
Unauthorized copying of software. The illegal duplication of software for commercial or personal use. Theft of software through the illegally copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. End user copying, Hard disk loading,, Counterfeiting, Illegal downloads from the internet.

IRC CRIME:
Internet Relay Chat crime
Internet Relay Chat (IRC) is a form of real-time Internet Online chat or synchronous conferencing. It is mainly designed for group communication in discussion forums called channels, but also allows one-to-one communication via private message, as well as chat and data transfers via Direct Client-to-Client. Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other.
Criminals use it for meeting conspirators.
Hackers use it for discussing their exploits / sharing the techniques.

No comments:

Post a Comment