Subscribe to our RSS Feeds
Hello, this is a sample text to show how you can display a short information about you and or your blog. You can use this space to display text or image introduction or to display 468 x 60 ads and to maximize your earnings.

Computer Crime

0 Comments »

It often involves stealing, using or selling company's personal data. A type of crime that refers to an illegal act involving the Internet is called cyber crime.
  • Computer Criminals:
The persons who commit computer crimes are known as computer criminals or cyber criminals. Different types of computer criminals are as follows:
 1.Hacker:
A person who accesses a computer or network illegally is known as hacker. This term was originally used for computer enthusiasts.
2.Cracker:
Cracker is a person who accesses a computer or network illegally for some negative purpose. A cracker may destroy data and steal important information etc.
3. Script Kiddie:
A person who attempts to access a computer or network illegally without technical knowledge is known as script kiddie. The script kiddies often use hacking or cracking software to access computers.

 4.Corporate Spy:
A person who is hired to break into a specific computer is known as corporate spy. Corporate spies have excellent computer and network corporate spy. Corporate spies have excellent computer and network skills. Some organizations hire them to identify security risks in the organization etc.
5. Unethical Employee:
 The unethical employees may access the computer for different reasons. Some may get financial gains by selling confidential information. Some unhappy employee may do this to get revenge etc. 
6. Cyber Extortionist :
A person who uses email as tool for extortion is known as cyber extortionist. Such persons send email to a company with a threat. They tell company to pay money otherwise they will expose confidential information of company etc,
7. Cyber Terrorist:
A person who uses computer Internet or network to destroy or damage computers for political reason is known as cyber terrorist. For example, cyber terrorists may destroy air traffic control system, electricity-generating systems or telecommunication system of a country etc.
Methods Used by Computer Criminals:
 The following methods are used by computer criminals:
  • Bomb:
 It is a program that triggers under certain conditions. It is usually activated at a certain date. It may be planted in commercial software like shareware software.
  • Data Diddling:
It is a process of changing data before or as it enters the system. The auditors must verify the accuracy of the source data and the processing that accurs.
  • Denial of Service:
It slows down a computer system or network. It floods a computer or network with requests for information or data. The server under attack receives so many requests that it cannot respond to legitimate users. 
  • Piggybacking:
 It is a process of entering the system by riding on the back of an authorized user. It occurs when an authorized user does not log off the system properly. An illegal user may continue where original user left.
  • Salami Technique:
It is a process of getting a small amount of money illegally from a large financial system
  • Scavenging :
 It is a process of searching company's trash cans to find useful information. The thieves search garbage and recycling bins of individuals to find bank account numbers and credit card numbers etc.
  • Trap Door :
 It is an illegitimate program that is left within a completed legitimate program. It allows subsequent entry by unauthorized user to change the program .
  • Trojan Horse:
 It is a program that hides itself within a useful program. It executes illegal, destructive instructions in the middle of the program such as computer game. FormatC is an example of a Trojan Horse.
  • Zapping:
 The zapping software is designed to bypass all security systems.
02.30

0 Responses to "Computer Crime"

Posting Komentar