what is cyber crime!!????

Post Reply
User avatar
sharoz khan
Initiator
Initiator
Posts: 1294
Joined: Mar 04, 2010
Location: hyderabad.

what is cyber crime!!????

Post by sharoz khan » Apr 30, 2010 Views: 3453

What is Cybercrime?

Online activities are just as vulnerable to crime and can compromise personal safety just as effectively as common everyday crimes. Lawmakers, law enforcement, and individuals need to know how to protect themselves and the persons for which they are responsible. You can see by the explanations of various cybercrimes below that the crimes have existed long before computers and the internet were made available to the general public. The only difference involves the tools used to commit the crime.

Types of Cybercrime

Assault by Threat – threatening a person with fear for their lives or the lives of their families or persons whose safety they are responsible for (such as employees or communities) through the use of a computer network such as email, videos, or phones.

Child Pornography – the use of computer networks to create, distribute, or access materials that sexually exploit underage children.

Cyber Contraband – transferring illegal items through the internet (such as encryption technology) that is banned in some locations.

Cyberlaundering – electronic transfer of illegally-obtained monies with the goal of hiding its source and possibly its destination.

Cyberstalking – express or implied physical threats that creates fear through the use of computer technology such as email, phones, text messages, webcams, websites or videos.

Cyberterrorism – premeditated, usually politically-motivated violence committed against civilians through the use of, or with the help of, computer techology.

Cybertheft – using a computer to steal. This includes activities related to: breaking and entering, DNS cache poisoning, embezzlement and unlawful appropriation, espionage, identity theft, fraud, malicious hacking, plagiarism, and piracy. Examples include:

Advertising or soliciting prostitution through the internet. It is against the law to access prostitution through the internet (including in the state of Nevada in the United States) because the process of accessing the internet crosses state and sometimes national borders. This is a violation of the federal Digital Millennium Copyright Act https://www.copyright.gov/legislation/dcma.pdf.
Drug Sales. Both illegal and prescription drug sales through the internet are illegal except as a customer through a state licensed pharmacy based in the United States https://www.fda.gov.
Computer-based fraud. Fraud is different from theft because the victim voluntarily and knowingly gives the money or property to the criminal but would not have if the criminal did not misrepresent themselves or their offering. Fraud is a lie. If someone leads you on or allows you to believe something that is false to benefit them, they are lying and this is fraud. You become a victim when you voluntarily surrender monies or property based on their misrepresentation or lie. Losing money from computer crime can be especially devastating because often it is very difficult to get the money back. Examples are: scams and altering data to get a benefit, suchas removing arrest records from the police station server, changing grades on the school computer system or deleting speeding tickets from driving records.
Online Gambling. Gambling over the internet is a violation of American law because the gambling service providers require electronic payment for gambling through the use of credit cards, debit cards, electronic fund transfers which is illegal with the Unlawful Internet Gambling Enforcement Act https://frwebgate.access.gpo.gov/cgi-bi ... eh.txt.pdf.
Cybertresspass – someone accesses a computer’s or network’s resources without the authorization or permission of the owner but does not alter, disturb, misuse, or damage the data or system. This is hacking for the purpose of entering an electronic network without permission. Examples might include:

Using a wireless internet connection at a hotel at which you are staying and accessing the hotel’s private files without disturbing them because they are available.
Reading email, files, or noting which programs are installed on a third-party's computer system without permission just for fun, because you can. This is sometimes called Snooping.
Cybervandalism - Damaging or destroying data rather than stealing or misusing them (as with cybertheft) is called cybervandalism. This can include a situation where network services are disrupted or stopped. This deprives the computer/network owners and authorized users (website visitors, employees) of the network itself and the data or information contained on the network. Examples:

Entering a network without permission and altering, destroying, or deleting data or files.
Deliberately entering malicious code (viruses, Trojans) into a computer network to monitor, follow, disrupt, stop, or perform any other action without the permission of the owner of the network.
Attacking the server of the computer network (DDoS attack) so the server does not perform properly or prevents legitimate website visitors from accessing the network resources with the proper permissions.


please be aware from this

User avatar
James.Striker
Extreme Poster
Extreme Poster
Posts: 2000
Joined: Feb 09, 2010
Location: Multan

Post by James.Striker » May 01, 2010

wow.

User avatar
sharoz khan
Initiator
Initiator
Posts: 1294
Joined: Mar 04, 2010
Location: hyderabad.

Post by sharoz khan » May 01, 2010

thnx 4r cmnt!

User avatar
ujala
Ultimate Contributor
Ultimate Contributor
Posts: 18532
Joined: Jan 31, 2009
Location: Islamabad
Contact:

Post by ujala » May 02, 2010

buht hi complicated si info ha

User avatar
sharoz khan
Initiator
Initiator
Posts: 1294
Joined: Mar 04, 2010
Location: hyderabad.

Post by sharoz khan » May 03, 2010

samaj toh aa gaya na wht is cyber crime

jacobadam
Wondering
Wondering
Posts: 15
Joined: Aug 08, 2011

Post by jacobadam » Aug 08, 2011

Cybercrime contains all criminal offences which are committed with the aid of communication devices in a network. This can be for example the Internet, the telephone line or the mobile network.

joanalorensen1
Just Born
Just Born
Posts: 1
Joined: Mar 07, 2012

cyber crime

Post by joanalorensen1 » Mar 07, 2012

i double agree on that post because it happened to me

Post Reply

Return to “Light Mood Articles”