Cybercrimes are generally defined as any type of illegal activity that makes use of the Internet, a private or public network, or an in-house computer system. It is a new evolving words that used in common days.
"Cyber" is derived from "cybernetic". That word derives from Greek "kybernetes", meaning "To steer". Cybernetics coined 1948 by U.S. mathematician Norbert Wiener (1894-1964) from Gk. kubernetes "steersman," perhaps based on 1830s Fr. cybernétique "the art of governing."
Nowadays, Cybercrime become more popular, and referring in to the bad side of Cyber Activity.
Definitions of Cyber crime on the Web:
- Computer crime or cybercrime is a form of crime where the Internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming.
- Criminal acts that are performed with the aid of a computer. Crimes that fit this category are identity theft, mischievous hacking, theft, and more.
From such a simple activity, cybercrimes turn into a huge terror, developing into complex threat. From general cybercrime can be descend into many specification crime type.
Types of Cybercrime
Assault by Threat – threatening a person with fear for their lives or the lives of their families or persons whose safety they are responsible for (such as employees or communities) through the use of a computer network such as email, videos, or phones.
Child Pornography – the use of computer networks to create, distribute, or access materials that sexually exploit underage children.
Cyber Contraband – transferring illegal items through the internet (such as encryption technology) that is banned in some locations.
Cyberlaundering – electronic transfer of illegally-obtained monies with the goal of hiding its source and possibly its destination.
Cyberstalking – express or implied physical threats that creates fear through the use of computer technology such as email, phones, text messages, webcams, websites or videos.
Cyberterrorism – premeditated, usually politically-motivated violence committed against civilians through the use of, or with the help of, computer techology.
Cybertheft – using a computer to steal. This includes activities related to: breaking and entering, DNS cache poisoning, embezzlement and unlawful appropriation, espionage, identity theft, fraud, malicious hacking, plagiarism, and piracy. Examples include:
1. Advertising or soliciting prostitution through the internet. It is against the law to access prostitution through the internet (including in the state of Nevada in the United States) because the process of accessing the internet crosses state and sometimes national borders. This is a violation of the federal Digital Millennium Copyright Act
2. Drug Sales. Both illegal and prescription drug sales through the internet are illegal except as a customer through a state licensed pharmacy based in the United States
3. Computer-based fraud. Fraud is different from theft because the victim voluntarily and knowingly gives the money or property to the criminal but would not have if the criminal did not misrepresent themselves or their offering. Fraud is a lie. If someone leads you on or allows you to believe something that is false to benefit them, they are lying and this is fraud. You become a victim when you voluntarily surrender monies or property based on their misrepresentation or lie. Losing money from computer crime can be especially devastating because often it is very difficult to get the money back. Examples are: scams and altering data to get a benefit, suchas removing arrest records from the police station server, changing grades on the school computer system or deleting speeding tickets from driving records.
4. Online Gambling. Gambling over the internet is a violation of American law because the gambling service providers require electronic payment for gambling through the use of credit cards, debit cards, electronic fund transfers which is illegal with the Unlawful Internet Gambling Enforcement Act
Cybertresspass – someone accesses a computer’s or network’s resources without the authorization or permission of the owner but does not alter, disturb, misuse, or damage the data or system. This is hacking for the purpose of entering an electronic network without permission. Examples might include:
1. Using a wireless internet connection at a hotel at which you are staying and accessing the hotel’s private files without disturbing them because they are available.
2. Reading email, files, or noting which programs are installed on a third-party's computer system without permission just for fun, because you can. This is sometimes called Snooping.
Cybervandalism - Damaging or destroying data rather than stealing or misusing them (as with cybertheft) is called cybervandalism. This can include a situation where network services are disrupted or stopped. This deprives the computer/network owners and authorized users (website visitors, employees) of the network itself and the data or information contained on the network. Examples:
* Entering a network without permission and altering, destroying, or deleting data or files.
* Deliberately entering malicious code (viruses, Trojans) into a computer network to monitor, follow, disrupt, stop, or perform any other action without the permission of the owner of the network.
* Attacking the server of the computer network (DDoS attack) so the server does not perform properly or prevents legitimate website visitors from accessing the network resources with the proper permissions.


3:40 PM
GF


0 comments:
Post a Comment