Tuesday 20 December 2011

Mode and Manner of Committing Cyber Crime:

1.       Theft of information contained in electronic form: This includes information stored in computer hard disk, removable storage media etc. Theft may be either by appropriating the data physically or by tempering them through the virtual medium.
2.       Email Bombing: This kind of activity refers to sending large number of mail to the victim, which may be an individual or a company or even mail servers there by ultimately resulting into crashing.

3.       Data Diddling: This kind of an attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed. The electricity board faced similar problem of data diddling while the department was being computerized.


4.       Salami attacks: This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed.
5.       Denial of Service attack: The computer of the victim is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service attack is also a type of denial of service attack, in which the offenders are wide in number and widespread.
6.       Virus/ Worm Attacks: Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on the computer’s memory.
7.       Logic Bombs: These are event dependent programs. This implies that these programs are created to do something only when a certain event occurs.  Even some viruses may be termed logic bombs because dormant all through the year and become active only on a particular date.
8.       Trojan Attack: This term has its origin in the word ‘Trojan horse’. In software field this means an unauthorized program, which passively gains control over another’s computer by representing itself as an authorized program. The most common form of installing a Trojan is through e-mail.
9.       Internet time thefts: Normally in these kinds of thefts the internet surfing hours of the victim are used up by another person. This is done by gaining access to the login ID and the password.
10.   Web jacking: This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the website of another. He may even manipulate or change the information of the website. This may be done for fulfilling political objectives or for money.

1 comment:

  1. merkur 2022 Merkur 2022 Merkur 2022 Merkur 2022 Merkur
    Merkur 2022 Merkur 2022 Merkur 2022 메리트카지노총판 Merkur 인카지노 2022 Merkur 2022 Merkur 21/22 Merkur 21.5mm. septcasino 4" x 4.5".

    ReplyDelete