It often involves stealing, using or selling company's personal data. A type of crime that refers to an illegal act involving the Internet is called cyber crime.
- Computer Criminals:
1.Hacker:
A person who accesses a computer or network illegally is known as hacker. This term was originally used for computer enthusiasts.
2.Cracker:
Cracker is a person who accesses a computer or network illegally for some negative purpose. A cracker may destroy data and steal important information etc.
3. Script Kiddie:
A person who attempts to access a computer or network illegally without technical knowledge is known as script kiddie. The script kiddies often use hacking or cracking software to access computers.
4.Corporate Spy:
A person who is hired to break into a specific computer is known as corporate spy. Corporate spies have excellent computer and network corporate spy. Corporate spies have excellent computer and network skills. Some organizations hire them to identify security risks in the organization etc.
5. Unethical Employee:
The unethical employees may access the computer for different reasons. Some may get financial gains by selling confidential information. Some unhappy employee may do this to get revenge etc.
6. Cyber Extortionist :
A person who uses email as tool for extortion is known as cyber extortionist. Such persons send email to a company with a threat. They tell company to pay money otherwise they will expose confidential information of company etc,
7. Cyber Terrorist:
A person who uses computer Internet or network to destroy or damage computers for political reason is known as cyber terrorist. For example, cyber terrorists may destroy air traffic control system, electricity-generating systems or telecommunication system of a country etc.
Methods Used by Computer Criminals:
The following methods are used by computer criminals:
4.Corporate Spy:
A person who is hired to break into a specific computer is known as corporate spy. Corporate spies have excellent computer and network corporate spy. Corporate spies have excellent computer and network skills. Some organizations hire them to identify security risks in the organization etc.
5. Unethical Employee:
The unethical employees may access the computer for different reasons. Some may get financial gains by selling confidential information. Some unhappy employee may do this to get revenge etc.
6. Cyber Extortionist :
A person who uses email as tool for extortion is known as cyber extortionist. Such persons send email to a company with a threat. They tell company to pay money otherwise they will expose confidential information of company etc,
7. Cyber Terrorist:
A person who uses computer Internet or network to destroy or damage computers for political reason is known as cyber terrorist. For example, cyber terrorists may destroy air traffic control system, electricity-generating systems or telecommunication system of a country etc.
Methods Used by Computer Criminals:
The following methods are used by computer criminals:
- Bomb:
- Data Diddling:
- Denial of Service:
- Piggybacking:
- Salami Technique:
- Scavenging :
- Trap Door :
- Trojan Horse:
- Zapping:
02.30
0 Responses to "Computer Crime"
Posting Komentar