cybercrimes (oumh1203) - english for written communication
TRANSCRIPT
-
8/2/2019 Cybercrimes (Oumh1203) - English for Written Communication
1/15
1. INTRODUCTION
The internet is growing rapidly. It has given rise to new opportunities in every field
especially entertainment, business, sports or education. Although internet bring a lot of
advantages to our community, but there are two sides to a coin. Internet also has its own
disadvantages. One of the major disadvantages is the illegal activitiy committed on the
internet, or know as Cyber Crimes.
Cybercrime, refers to any crime that involves a computer and a network. The
computer may have been used in the commission of a crime, or it may be the target.
(passage pick from: http://en.wikipedia.org/wiki/Computer_crime)
Cyber crime encompasses any criminal act dealing with computers and networks
(called hacking). Additionally, cyber crime also includes traditional crimes conducted
through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity
theft, and credit card account thefts are considered to be cyber crimes when the illegal
activities are committed through the use of a computer and the Internet. (passage pick from:
http://www.webopedia.com/TERM/C/cyber_crime.html)
Cyber crime generally means a wrongful act committed using computer as a tool
or a target of the said act or both. (passage pick from:
http://www.laweddie.com/wordpress/what-are-cyber-crimes/)
Cyber crime are more properly restricted to describing criminal activity in which
the computer or network is a necessary part of the crime, these terms are also sometimes
used to include traditional crimes, such as fraud, theft, blackmail, forgery, and
embezzlement, in which computers or networks are used to facilitate the illicit activity.
Cyber crime can broadly be defined as criminal activity involving an information
technology infrastructure, including illegal access (unauthorized access), illegal
interception (by technical means of non-public transmissions of computer data to, from or
within a computer system), data interference (unauthorized damaging, deletion,
deterioration, alteration or suppression of computer data), systems interference (interfering
with the functioning of a computer system by inputting, transmitting, damaging, deleting,
http://en.wikipedia.org/wiki/Computer_crimehttp://www.webopedia.com/TERM/C/cyber_crime.htmlhttp://www.laweddie.com/wordpress/what-are-cyber-crimes/http://en.wikipedia.org/wiki/Computer_crimehttp://www.webopedia.com/TERM/C/cyber_crime.htmlhttp://www.laweddie.com/wordpress/what-are-cyber-crimes/ -
8/2/2019 Cybercrimes (Oumh1203) - English for Written Communication
2/15
deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft),
and electronic fraud.
Cyber crime is the latest and perhaps the most complicated problem in the cyber
world. Cyber crime may be said to be those species, of which, genus is the conventional
crime, and where either the computer is an object or subject of the conduct constituting
crime. Any criminal activity that uses a computer either as an instrumentality, target or a
means for perpetuating further crimes comes within the ambit of cyber crime.
Since computer and network appeared, the cyber crimes starts stimulating. Various
crime technics piling up one after another makes people hard to take precautions to against
them. To avoid ourself to be the victim of cyber crimes, We need to have full understand to
this aspect. Unlike conventional crimes such as burglary, rape or murder, cyber crimes are
very skill intensive. The modern thief can steal more with a computer than with a gun.
Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.
Cyber crime can broadly be defined as criminal activity involving the information
technology infrastructure, including illegal access (unauthorized access), illegal
interception (by technical means of non-public transmissions of computer data to, from or
within a computer system), data interference (unauthorized damaging, deletion,
deterioration, alteration or suppression of computer data), system interference (interfering
with the functioning of a computer system by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft),
and electronic fraud.
2. CONTENT
2.1 Classification of cyber crimes
Cyber crimes become the hot issue and the very usual social phenomena since
computer and network were appeared. The most important factor in understanding the
limitations of such generalisations is that malware and hack attacks can be launched from
anywhere and by anybody. Likewise we have to be aware that criminals will go to great
lengths to obscure their tracks.So drawing a definitive map of cyber crime is therefore far
-
8/2/2019 Cybercrimes (Oumh1203) - English for Written Communication
3/15
from an exact science and assuming any one country has sole rights to any one crime
would be a mistake. Cyber crime is truly a global problem.
"The modern thief can steal more with a computer than with a gun. Tomorrow's
terrorist may be able to do more damage with a keyboard than with a bomb". National
Research Council, "Computers at Risk", 1991. Through this passage we can know that
cybercrimes can bring much bad impact to individual, community or our country.
Mr. Pavan Duggal, is one of the pioneers in the field of Cyberlaw and is Asia's
leading authority on Cyberlaw. He is a practicing Advocate, Supreme Court of India and a
Cyberlaw Consultant. He is the President & founder ofCyberlaw India . He is also the
Founder President ofCyberlaw Asia, Asias pioneering organization committed to the
passing of dynamic Cyberlaws in the Asian continent. Cyberlaw Asia is engaged in the
process of creating greater awareness about Cyberlaws in different countries of Asia. Mr.
Pavan Duggal clearly defined the various categories and types of cybercrimesin a report.
Cybercrimes can be basically divided into three major categories:
i. Cybercrimes against individual.
ii. Cybercrimes against organization.
iii. Cybercrimes against Society at large.
i) Against individual
Malware and malicious code
Denial-of-service attack
Computing virus
Cyber terrorism
Information warfare
Cyber stalking
Fraud and identity theft
Phishing
Virtual crime
Individual property:
a. Unauthorized control or access over computer system
-
8/2/2019 Cybercrimes (Oumh1203) - English for Written Communication
4/15
b. Internet time thefts.
c. Netrespass
d. Computer vandalism
e. Intellectual Property crimes
f. Transmitting virus
Cybercrimes against individual include various crimes like transmission of child-
pornography, harassment of any one with the use of a computer such as e-mail. The most
important Cybercrimes today are trafficking, distribution, posting, and dissemination of
obscene material including pornography and indecent exposure. The potential harm of such
a crime to humanity if not controlled can hardly be amplified.
This is one Cybercrime which threatens to undermine the growth of the younger
generation as also leave irreparable scars and injury on the younger generation.
There is an incident happen cause by the cybercrimes:
A minor girl in Ahmedabad was lured to a private place through cyber-chat by a
man, who, along with his friends, attempted to gang rape her. As some passersby heard her
cry, she was rescued.
ii) Againts organization
i. Unauthorized control/access over computer system
ii. Possession of unauthorized information.
iii. Cyber terrorism against the government organization.
iv. Distribution of pirated software etc.
For an example, a Mumbai-based upstart engineering company lost a say and much
money in the business when the rival company, an industry major, stole the technical database
from their computers with the help of a corporate cyberspy.
iii) Against Society at large
i. Pornography (basically child pornography).
-
8/2/2019 Cybercrimes (Oumh1203) - English for Written Communication
5/15
ii. Polluting the youth through indecent exposure.
iii. Trafficking
iv. Financial crimes
v. Sale of illegal articles
vi. Online gambling
vii.Forgery
In a report of expressindia. com, it was said that internet was becoming a boon for the
terrorist organisations. According to Mr. A.K. Gupta, Deputy Director (Co-ordination), CBI,
terrorist outfits are increasingly using internet to communicate and move funds. "Lashker-e-
Toiba is collecting contributions online from its sympathisers all over the world. During the
investigation of the Red Fort shootout in Dec. 2000, the accused Ashfaq Ahmed of this
terrorist group revealed that the militants are making extensive use of the internet to
communicate with the operatives and the sympathisers and also using the medium for intra-
bank transfer of funds".
There are few example of cybercrimes that been report and identified for the last
few years:
2.1.2 Manner Of Commiting Cyber Crime:
1. Unauthorized control or access over computer system (hacking)
This activity is commonly referred to as hacking. It is the most common from of
cyber crime snd it continues to grow popularity. A hacker is someone who uses a
computer and network or internet connection to intrude into another computer or
system to perform an illegal act. This may amount to simple trespassing or acts that
corrupt, destroy or change data.
2. Malicious code and virus/Transmitting virus or worms
Malware or malicious software is software designed to infiltrate or damage
computer system without owners informed consent. The expression is a general
term used by computer professionals to mean a variety of forms of hostile,
intrusive, or annoying software or program code.
-
8/2/2019 Cybercrimes (Oumh1203) - English for Written Communication
6/15
Worms and viruses are forms of high-tech maliciousness. A worm is a program that
copies itself repeatedly into a computers memory or onto a disk drive. Sometimes
it will copy itself so often it will cause a computer to crash.
A virus is a nonstandard program stored on a computer hard drive that can cause
unexpected and often undesirable effects such as destroying or corrupting data.
Worms and viruses are passed in various ways:
i. by diskettes CDs or thumb drives
ii. by network
3. Cyber terrorism against the government organization
A software bomb or virus directed against military, government, or civilian
computers may make as powerful a statement as a real bomb, and cause just as
much damage. The Red Brigade manifesto specifically includes destruction of
computer targets as an objective.
Cyber terrorism may be defined to be the premeditated use of disruptive activities,
or the threat thereof, in cyber space, with the intention to further social, ideological,
religious, political or similar objectives, or to intimidate any person in furtherance
of such objectives
Another definition may be attempted to cover within its ambit every act of cyber
terrorism.
A terrorist means a person who indulges in wanton killing of persons or in
violence or in disruption of services or means of communications essential
to the community or in damaging property with the view to
(1) putting the public or any section of the public in fear; or
-
8/2/2019 Cybercrimes (Oumh1203) - English for Written Communication
7/15
(2) affecting adversely the harmony between different religious, racial,
language or regional groups or castes or communities; or
(3) coercing or overawing the government established by law; or
(4) endangering the sovereignty and integrity of the nation
4. fraud and cheating
Internet fraud is any dishonest misrepresentation of fact intended to induce another
to do or refrain from doing something which causes loss.
Online fraud and cheating is one of the most lucrative businesses that are growing
today in the cyber space. It may assume different forms. Some of the cases of
online fraud and cheating that have come to light are those pertaining to credit card
crimes, contractual crimes, offering jobs, etc.
5. Cyber-stalking-
The use of communication technology, mainly the Internet, to torture other
individuals is known as cyber-stalking. False accusations, transmission of threats
and damage to data and equipment fall under the class of cyber-stalking activities.
The Oxford dictionary defines stalking as "pursuing stealthily". Cyber stalking
involves following a person's movements across the Internet by posting messages
(sometimes threatening) on the bulletin boards frequented by the victim, entering
the chat-rooms frequented by the victim, constantly bombarding the victim with
emails etc.
Cyber-stalkers often target the users by means of chat rooms, online forums and
social networking websites to gather user information and harass the users on thebasis of the information gathered. Obscene emails, abusive phone calls and other
such serious effects of cyber-stalking have made it a type of computer crime.
6. Phishing
-
8/2/2019 Cybercrimes (Oumh1203) - English for Written Communication
8/15
Phishing is the act of attempting to acquire sensitive information like usernames,
passwords and credit card details by disguising as a trustworthy source. Phishing is
carried out through emails or by luring the users to enter personal information
through fake websites. It also might be as simple as trash diving for obtaining
useful information about user to phone survey. In this situation, a hacker may
contact potential victims by phone, e-mail or fake websites and ask the victims to
provide password information for an apparently legitimate reason. Criminals also
often use websites that have a look and feel of some popular website, which makes
the users feel safe to enter their details there.
7. Spoofing
A spoofing attack is a situation in which one person or program successfully
masquerades as another by falsifying data and thereby gaining an illegitimate
advantage.
The word "spoof" means to hoax, trick, or deceive. Therefore, in the IT world,
spoofing refers tricking or deceiving computer systems or other computer users.
This is typically done by hiding one's identity or faking the identity of another user
on the Internet. Spoofing can take place on the Internet in several different ways.
One common method is through e-mail.
E-mail spoofing involves sending messages from a bogus e-mail address or faking
the e-mail address of another user. Fortunately, most e-mail servers have security
features that prevent unauthorized users from sending messages. However,
spammers often send spam messages from their own SMTP, which allows them to
use fake e-mail addresses. Therefore, it is possible to receive e-mail from an
address that is not the actual address of the person sending the message.
8. Cyber theft
Cyber-Theft is the use of computers and communication systems to steal information in
electronic format. Hackers crack into the systems of banks and transfer money into their
own bank accounts. This is a major concern, as larger amounts of money can be stolen
and illegally transferred.
-
8/2/2019 Cybercrimes (Oumh1203) - English for Written Communication
9/15
9. Harassment
Cyber harassment, is a kind of cyber crime that repeatedly making reference to a
person in an offensive, rude, or insulting manner online (can be a form of
cyberbullying). This is a very common type of harassment via e-mails.Harassmentthrough e-mails is not a new concept. It is very similar to harassing through letters.
10. Computer vandalism
Computer vandalism is a program that performs malicious function such as
extracting a user's password or other data or erasing the hard disk. A vandal differs
from a virus, which attaches itself to an existing executable program. The vandal is
the full executing entity itself which can be downloaded from the Internet in the
form of an ActiveX control, Java applet, browser plug-in or e-mail attachment.
It also can bring out as the unauthorized removal of valuable information from a
computer system, thereby preventing the legitimate user or owner from having
access to that information.
11. Logic bomb
Logic bomb is a computer program that uses illegitimate instructions or misuses
legitimate instructions to damage data structures; operates at a specific time,
periodically, or according to other instructions.
12. Attack code
Attack code is a a malicious software program intended to impair or destroy the
functioning of a computer or a network resource.
2.2 Comparison Of Cyber Crimes In Malaysia And USA
In Malaysia, the in Information and Communication Technology industry (ICT) is
grow rapidly. The usage and the develop of ICT has been widely found in many sector such
like government, private sector and event individuals. However, the develop of ICT also
bring along various type of negative effect. The unlawful acts wherein the computer is either
a tool or target or both, can be define as cybercrime.
-
8/2/2019 Cybercrimes (Oumh1203) - English for Written Communication
10/15
Cyber999 is a service offered by MyCERT (Malaysian Computer Emergency
Response Team) was launched on year 2009 to handle security issues or incidents faced by
computer/internet users within the Malaysian Cyber-Security constituency.
"Cybersecurity crimes in Malaysia average about 300 cases a month and we need to
address such issues which include viruses and intrusion," Deputy Minister of Science,
Technology and Innovation, Datuk Fadillah Yusof said after the signing of a memorandum
of understanding (MOU) between Kolej Yayasan Melaka and The International Council of
Electronic Commerce Consultants(EC-Council) Asia Pacific.
Based on a report from Cybersecurity, more than 4,000 cyber complaints, mostly
concerning cyber crimes have been lodged with Cybersecurity Malaysia in the year 2008 and
2009.
Year Complaints % (+ / -)
2007 2,000
2008 2,123
2009 3,564 68
2010 8,090 127
2011 (Jan~June) 7,404 147
Figure 1: Cyber Security Incidents Reported to Cyber999
-
8/2/2019 Cybercrimes (Oumh1203) - English for Written Communication
11/15
-
8/2/2019 Cybercrimes (Oumh1203) - English for Written Communication
12/15
Malaysian Computer Emergency Response Team (MyCERT) report
Although the case classification was same, cybercrimes in Malaysia are low if
compare to USA. Based on the IC3 2010 Annual Report on Internet Crime Released, In
2010, IC3 received 303,809 complaints of Internet crime, the second-highest total in IC3's
10-year history.
The Internet Crime Complaint Center (IC3) is a partnership between the Federal
Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C),
funded in part by the Bureau of Justice Assistance (BJA). Since its creation in 2000, IC3
has received more than 2 million Internet crime complaints.
Yearly Comparison of Complaints Received Via the IC3 Website
-
8/2/2019 Cybercrimes (Oumh1203) - English for Written Communication
13/15
Top 10 Crimes Received Via the IC3 Website
All the figures above only shown the cases that had been reported and investigated.
The total amount should be higher than the amount that shown since targets may not
always report these offences. But the data collected from Cybersecurity and IC3 surveys
can help in understanding the impact of cybercrime.
Cyber crime is clearly an international problem.The number of cybercrimes
increase year by year. Cybercrime is a multi-billion dollar problem. Law enforcement must
seek ways to keep the drawbacks from overshadowing the great promise of the computer
age. Cybercrime is a menace that has to be tackled effectively not only by the official but
also by the users by co-operating with the law.
2.3 Solution
An important question arises that how can these crimes be prevented. A number of
techniques and solutions have been presented but the problems still exists and are
increasing day by day. Prevent is better then cure, we have to complete our own with the
knowledge about how to prevent cybercrimes:
1.to prevent cyber stalking avoid disclosing any information pertaining to oneself.
This is as good as disclosing your identity to strangers in public place.
2.always avoid sending any photograph online particularly to strangers and chat
friends as there have been incidents of misuse of the photographs.
3.always use latest and up date anti virus software to guard against virus attacks.
-
8/2/2019 Cybercrimes (Oumh1203) - English for Written Communication
14/15
4.always keep back up volumes so that one may not suffer data loss in case of virus
contamination
5.never send your credit card number to any site that is not secured, to guard
against frauds.
6.always keep a watch on the sites that your children are accessing to prevent any
kind of harassment or depravation in children.
7.it is better to use a security programme that gives control over the cookies and
send information back to the site as leaving the cookies unguarded might prove
fatal.
8.web site owners should watch traffic and check any irregularity on the site.
Putting host-based intrusion detection devices on servers may do this.
9.use of firewalls may be beneficial.
10. web servers running public sites must be physically separate protected from
internal corporate network.
3. Conclution
We are currently living in Cyber age, where Internet and computers have major
impacts on our way of living, social life and the way we conduct businesses.
The usage of information technology has posed great security challenges and
ethical questions in front of us. Just as every thing has positives and negatives, there aretwo sides to a coin. The usage of information technology is beneficial as well as insecure.
With the growth of the internet, network security has become a major concern.
Cyber crimes have emerged rapidly in the last few years and have major consequences. As
the cases of cybercrime grows, there is a growing need to prevent them.
Capacity of human mind is unfathomable. It is not possible to eliminate cyber crime
from the cyber space. It is quite possible to check them. History is the witness that no
legislation has succeeded in totally eliminating crime from the globe. The only possible
step is to make people aware of their rights and duties and further making the application of
the laws more stringent to check crime.
-
8/2/2019 Cybercrimes (Oumh1203) - English for Written Communication
15/15
4. References:
1. http://wiki.answers.com/Q/What_does_computer_vandalism_mean#ixzz1d0EW9dwQ
2. http://en.wikipedia.org/wiki/Computer_crime
3. http://www.cyberlawindia.com/pd.php
4. http://www.marketingcharts.com/direct/web-crime-complaints-drop-yoy-up-in-decade-
16536/crimecomplaintcenter-crime-trend-2000-2010-mar11gif/
5.
http://highered.mcgrawhill.com/sites/0073401536/student_view0/chapter16/chapter_glossary.htm
l
http://wiki.answers.com/Q/What_does_computer_vandalism_mean#ixzz1d0EW9dwQhttp://en.wikipedia.org/wiki/Computer_crimehttp://www.cyberlawindia.com/pd.phphttp://www.marketingcharts.com/direct/web-crime-complaints-drop-yoy-up-in-decade-16536/crimecomplaintcenter-crime-trend-2000-2010-mar11gif/http://www.marketingcharts.com/direct/web-crime-complaints-drop-yoy-up-in-decade-16536/crimecomplaintcenter-crime-trend-2000-2010-mar11gif/http://highered.mcgrawhill.com/sites/0073401536/student_view0/chapter16/chapter_glossary.htmlhttp://highered.mcgrawhill.com/sites/0073401536/student_view0/chapter16/chapter_glossary.htmlhttp://wiki.answers.com/Q/What_does_computer_vandalism_mean#ixzz1d0EW9dwQhttp://en.wikipedia.org/wiki/Computer_crimehttp://www.cyberlawindia.com/pd.phphttp://www.marketingcharts.com/direct/web-crime-complaints-drop-yoy-up-in-decade-16536/crimecomplaintcenter-crime-trend-2000-2010-mar11gif/http://www.marketingcharts.com/direct/web-crime-complaints-drop-yoy-up-in-decade-16536/crimecomplaintcenter-crime-trend-2000-2010-mar11gif/http://highered.mcgrawhill.com/sites/0073401536/student_view0/chapter16/chapter_glossary.htmlhttp://highered.mcgrawhill.com/sites/0073401536/student_view0/chapter16/chapter_glossary.html