Cyber Crime

Only available on StudyMode
  • Topic: Fraud, Computer crime, Crime
  • Pages : 9 (2810 words )
  • Download(s) : 263
  • Published : March 18, 2011
Open Document
Text Preview
Cyber Crime and Security

Submitted by: Ms.Poonam S. Ramteke (T.E C.S.E)
K.I.T.’s College of Engineering.

Society is becoming more dependent upon data and networks to operate our businesses, government, national defense and other critical functions. Cybercrime, which is rapidly increasing in frequency and in severity, requires us to rethink how we should enforce our criminal laws. The current model of reactive, police-based enforcement, with its origins in real-world urbanization, does not and cannot protect society from criminals using computer technology. This paper gives detailed information regarding cybercrime, its types, modes of cyber crime and security measures including prevention to deal effectively with cybercrime. It demonstrates a need for a timely review of existing approaches to fighting this new phenomenon of cybercrime in the information age. Though it is not possible to remove Cyber Crime from the world but we can reduce it to a large extent by creating awareness in Society. We suggest a system of administrative regulation backed by criminal sanctions that will provide the incentives necessary to create a workable deterrent to cybercrime.


2.Types of Cyber Crimes

3.Cyber Criminals

4.Mode of Cyber Crimes


6.Case Study



Cybercrime is an umbrella term that covers a wide array of attacks and scams.Cyber crime also known as Computer crime generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime. Although the terms computer crime and cybercrime are more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, these terms are also sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, and embezzlement, in which computers or networks are used. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access, illegal interception , data interference , systems interference , misuse of devices, forgery , and electronic fraud. It covers everything from phishing and pharming techniques to devastating network viruses, from identity theft to cyberstalking and harassment, from self-replicating crime ware programs to cyberterrorism. Computer crime issues have become high-profile, particularly those surrounding hacking, copyright infringement through warez and pornography. Classification of Crimes:

It may be divided into one of two types of categories:
(1) Crimes that target computer networks or devices directly (2) Crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device. When a person starts to steal information from sites, or cause damage to, a computer or computer network. The definitions have to be modified to ensure that fraudulent behavior remains criminal no matter how it is committed. Even though the computer is not directly used for criminal purposes, it is an excellent device for record keeping, particularly given the power to encrypt the data. If this evidence can be obtained and decrypted, it can be of great value to criminal investigators. Types of Cyber Crime:

Pharming: Pharming is a hacker's attack aiming
to redirect a website's traffic to another,
bogus website. Pharming can be conducted
either by changing the hosts file on a victim’s
computer or by exploitation of a vulnerability
in DNS server software.
Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by hidden as a trustworthy entity in an electronic communication. Very often, phishing is done by electronic...
tracking img