The Crime and the criminal of the cyber world.
The Crime and criminal of the cyber world.
In our normal life there is a lots of criminals and there is a lots of national security agency who work to protect us from those criminals.You may well familiar with some words like killer, theft, terrorist etc. in the world where we are surviving with our physical & mental needs.There is law for them to punished but what happens to the virtual world? Just imagine that its an another parts of our life where everything is controlled by us but not like our physical world.
Cyber-crimes:
According to Google, "criminal activities carried out by means of computers or the Internet."
According to Wikipedia,
"Offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)"
"Offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)"
In short, Cyber-crimes is any criminal activity that involves a computer device or a network.
Types of Cyber-crimes :
1. Computer Fraud: is the act of using a computer to take electronic data, or to gain unlawful use of a computer or system. 2. Privacy Violation: Expose personal information such as E-mail address,Phone number, Bank account etc. on social media or websites.
3. Identity Theft: Stealing personal information from somebody and impersonating that person.
4.Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks,Photos, Writing, Video, Audio and computer programs etc.
5.Electronic funds transfer: un-authorized accessed to the bank websites and making illegal funds transferring.
6.Electronic money laundering: This is the virtual terms of money laundering.
7.ATM Fraud: At present ATM is the most widely use financial system but ATM Fraud make it risky like stealing ATM PIN, ATM card number etc.
8.Denial of Service Attacks:This involves the use of computers in multiple locations to attack servers with a view of shutting them down.
9.Spam: Sending unauthorized emails. These emails usually contain advertisements.
What is Hacking?
Hacking is identifying weakness in computer systems or networks to exploit its weaknesses to gain access.
Example of Hacking: Using password cracking algorithm to gain access to a system
Hackers: The people who are doing the job of hacking are called hackers.
There are basically three types of Hackers:
Ethical Hacker (White hat): A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform testing and vulnerability assessments.Normally they are work for the government.
Cracker (Black hat): A
hacker who gains unauthorized access to computer systems for personal
gain. The intent is usually to steal corporate data, violate privacy
rights, transfer funds from bank accounts etc. This types of hackers are
always try to make an unexpected situation and they always want to
gain personal benefits.
Grey hat: A
hacker who is in between ethical and black hat hackers. He/she breaks
into computer systems without authority with a view to identify
weaknesses and reveal them to the system owner. This types of hackers
has no rules they work where they get benefits.
There are also another three types of hackers:
Script kiddies: A non-skilled person who gains access to computer systems using already made tools.This is like software running some hackers made software for hacking and they sale it. And the person who don't know how to hack someone they use it for they are purpose.
Hacktivist: I think everyone is quite familiar to it. A hacker who use hacking to send social, religious, and political, etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.
Phreaker: This one is quite interesting.A hacker who identifies and exploits weaknesses in telephones instead of computers.
Courtesy
Comments
Post a Comment