COMPUTER CYBER CRIME LAW Introduction CYBER CRIMES v
COMPUTER CYBER CRIME LAW
Introduction :
CYBER CRIMES
v. HACKING v. DENIAL OF SERVICE ATTACK v. VIRUS DESSIMINATION v. SOFTWARE PIRACY v. PORNOGRAPHY v. IRC Crime v. CREDIT CARD FRAUD v. NET EXTORTION v. PHISHING v. SPOOFING v. CYBER STALKING v. CYBER DEFAMATION v. THREATENING v. SALAMI ATTACK
Hacking in simple terms means illegal intrusioninto a computer system without the permission of the computer owner/user. This is an act by the criminal, who floods the bandwidth of the victim¶s network or fills his e-mail box with spam mail depriving him of the services heis entitled to access or provide
Malicious software that attaches itself to other software. (virus, worms, Trojan. Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious softwares) Copying the company¶s confidential data in order to extortsaid company for huge amount
Getting one computer on a network to pretend to have theidentity of another computer, usually one with special access privileges , so as to obtain access to the other computers on thenetwork. The Criminal follows the victim by sending emails, enteringthe chat rooms frequently.
The Criminal sends emails containing defamatory matters toall concerned of the victim or post the defamatory matters ona website. ( disgruntled employee may do this Against boss, ex-boys friend against girl, Divorced husband againstwife etc) The Criminal sends threatening email or comes in contact inchat rooms with or victim. Any one disgruntled may do this againstboss, friend or official)
Cyber Crimes Mobiles Banking Internet
v. Chipping and pinning. v. Usage of mobiles in cinema theatres to take videos. v. Irritating an unknown person by continuous smsand phonecalls. v. Taking photos without knowledge of that particular person. v. Mobile robberies. v. Blue bugging ±unknown persons interruption using bluetooth.
v Nigerian money offers. v. Misusing others credit card in the public. v. Abusing pin numbers of credit cards. v. Issuing fake cheques.
v. Sale of duplications. v. Misusing the information stored on others personal computer or website. v. Software piracy. v. Forgeries such as ID theft. v. Harmful software -attaches itself to other software.
v. Use anti-virus software andfirewalls keep them up to date v. Keep your operating system upto date with critical securityupdates and patches v. Don't open emails or attachments from unknownsources v. Use hard-to-guess passwords. Don¶t use words found in adictionary. Remember that password cracking tools exist v. Back-up your computer data ondisks or CDs often
- Slides: 15