Unit 2 Cyber Crime
Unit 2 Cyber Crime
Categories of Cybercrime
There are three major categories that cybercrime falls into: individual, property
and government.
1. Crimes against People
These crimes include cyber harassment and stalking, distribution of child
pornography, credit card fraud, human trafficking, spoofing, and identity theft.
2. Crimes against Property
Some online crimes occur against property, such as a computer or server. These
crimes include DDOS attacks, hacking, virus transmission, copyright infringement, and
IPR violations.
3. Crimes against Government
A crime against the government is also known as cyber terrorism. Government
cybercrime includes hacking government websites, military websites. These criminals
are usually terrorists or enemy governments of other nations.
Types of Cyber Crime
Viruses:
Virus: Vital Information Resources Under Seize
A virus is a malicious executable code attached to another executable file that can be
harmless or can modify or delete data. When the computer program runs attached
with a virus it performs some action such as deleting a file from the computer system.
Viruses can’t be controlled by remote. The ILOVEYOU virus spreads through email
attachments. It can affect the data files, boot sector of hard drive etc. when its
replication succeeds. The affected area is said infected.
Viruses are human made programs generally write to access private information,
corrupt data, to display political and humorous messages on the user's screen. They
insert themselves into host programs and spread on the execution of infected
programs.
Worms :
Worms are similar to a virus but it does not modify the program. It replicates
itself more and more to cause slow down the computer system. Worms can be
controlled by remote. The main objective of worms is to eat the system
resources.
Sr.No. Basis of WORMS VIRUS
Comparison
13. Interface It does not need human action It needs human action to
to replicate. replicate.
Software Piracy
Software Piracy is the illegal approach of copying, distributing, modifying, selling,
or using the software which is legally protected. So in a simple term, we can say
Software piracy is the act of stealing legal software in an illegal way. This
software piracy refers to the unauthorized copy and use of legal software. And
now this critical problem has turned into a global issue.
Regulation for Software Piracy :
Software piracy is illegal and there are strict laws for these illegal activities. So
monetary penalties are also there for this lawbreaker who breaks these copyright
laws and creates copyright violation.
End- User License Agreement (EULA) is a license agreement which is mostly used for
software to protect its legality. It is a contract between the manufacturer and the end-
user. This rule defines the rules for legal software. One common rule in EULA is that it
prevents the user from sharing the software with others.
Types of Software Piracy :
There are mainly 5 types of Software Piracy.
1. Softlifting-
It is the most common type of software piracy. In this piracy, the legal owner of
the software is one, but the users are multiple. For instance, someone
purchases the genuine software, and others will illegally use that software by
downloading the software to their computer.
For example, many times we borrow the software from our colleague and install a
copy of that on our computer just to save the money which rises to softlifting one
type of software piracy.
2. Hard- disk Loading-
It is the most common type of software piracy which mainly happens in PC
resell shops. The shop owner buys a legal copy of the software and reproduces
its copies in multiple computers by installing it. Most of the time customers/PC
users are not aware of these things and get the pirated version of the software
in the original S/W price or less than the original price. It is one type of
Commercial software piracy.
3. Counterfeiting-
In counterfeiting the duplicates are created of genuine/legal software
programs with the appearance of authenticity. Then these duplicate software
are sold out at less price.
4. Client- Server overuse –
In client- server overuse, more copies of the software are installed than it has
licensed for. Mainly it has seen in local business sectors when they work under
a local area n/w and install the software in all the computers for use by a
number of employees which is an unauthorized practice.
5. Online Piracy-
In online piracy, the illegal software is acquired from online auction sites and
blogs which is mainly achieved through the P2P(Peer to Peer) file- sharing
system. As it is acquired by means of the Internet, often it is called Internet
Piracy.
Web Jacking
In simplest terms, when attackers illegally gain control of an organisation’s or
individual’s website is known as Web Jacking. The hackers implant a fake website,
which, when you open it, takes you to another fraudulent website, where the attackers
try to extract sensitive information. This crucial data can range from simple account
passwords to credit card details.
There are still millions of people who do not understand the significance of Cyber
Security, let alone web threats like Web Jacking. The safety of your web must be a
priority. This is why it is important to understand how Web Jacking works and
learn how to prevent it.
Once they've exploited one or more of those security flaws, the attackers gain access
to your system. Usually, they're trying to gain administrative access to your website.
This doesn't always come with the first account that they access, so they may need to
exploit yet more vulnerabilities in order to gain administrative access. Once the
attacker gains administrative access, they're free to do whatever they wish. That's
when they start to deface your website
● Using hacking tools to get into the victim’s laptop or smartphone camera and
secretly record them
Cyber Pornography
Cyber Pornography means the publishing, distributing or designing
pornography by using cyberspace. The technology has its pros and cons and cyber
pornography is the result of the advancement of technology. With the easy availability
of the Internet, people can now view thousands of porn on their mobile or laptops,
they even have access to upload pornographic content online.