Global outlook on Cybercrime - Como Hacks

Como Hacks

Building a comfort for your growth!

Global outlook on Cybercrime

Share This
"Hi! Welcome to https://usociety4.blogspot.com/ . The purpose of this blog is to elevate individuals who don’t know what are cyber crimes and its importance in this technological duration throughout society. Understanding the threat of cyber crimes are very important because technology holds a great impact on our society as a whole."

Introduction

 In our modern duration of technology, our personal information is very difficult to keep private. The veracity is, extremely classified aspects are becoming more accessible to public databases, because we are more interconnected than ever. Our data is accessible for almost anyone to filter through due to this inter connectivity. This whole thing creates a negativity in our minds that the use of technology is very desperate because anyone can be accessible to our private data by giving some price and do something illegal with the help of our private information which will cause danger. Common internet users may be unaware of cyber crimes. Many of legitimate individuals  fall victim to cyber crime around the world since technology is growing rapidly. Cybercrime occurs when penetration of privacy at surrounding will be common.

Reality of Cybercrimes

As many questions came in our mind when the term cyber crime is brought into question. Some questions that arise are: “Does cyber crimes only done by the internet?”, “Does cyber crimes are done by computers only?” and so on, however, conventional crimes such as thievery, robbery and fraud that have been done by physical ways are now been converted into digital resources and are now considered as cyber crimes. But what are cyber crimes"

“ A crime committed using a computer and the internet to steal a person's identity or sell contraband or stalk victims or disrupt operations with malevolent programs.”


Regulations of cybercrimes

Let me highlight some laws and legislation that carry out cyber crimes in the U.S and within other countries. Let people know some of the laws to protect them and some of the modifications to these laws to keep up with the different advancement in technology.

In the United States 

As each state has their own different way of dealing with different types of cyber crimes being committed on the daily basis. In the United States, the laws and legislation concerning cyber crime diverge from state to states.

In 1984, The Computer Fraud and Abuse (CFAA) it was very difficult for federal law authoritarian to use such legislation to incriminate anyone because of the adversity of writing such an Act. The Act requires extensive verification about suspect that penetrate computer without authorization which in turn can be a major constraints.

In 1994, the Act was again meet to new complications that appear such a malicious codes (bugs), viruses, worms and other curriculum that were only designed to harm data on a computer. After applying it was now equipped to any individuals who broke the law in terms of using that malicious programs with the intention of harming computer.

In 1996, The National Information Infrastructure Act (NIIA) was passed and it added onto the CFFA, that it became illegal to view info on a computer about someone without any kind of authorization.

In 1998, The Digital Millennium Copyright Act was take place. This Act excludes the modification of information of inventor, the terms and environment for use of such set work or the purpose of its intent. This Act implement a way in which civil establishment can be enforced as well as criminal punishment for violation.

In 2003, Cyber Security Enhancement act was take place. This Act, increased the punishment which were set out in the CFFA which in turns means harsher punishment for individuals who voluntarily committed computer crimes in the end result of even bodily injuries etc. The duration for the punishment can range from 5 to 20 years, or even life imprisonment.

 

Methods of Violation and causes of Cybercrimes

Hacking

An unauthorized access to any computer system or a network. This method can be happened when a system has a vulnerable hardware or software installed on it, which can be penetrated if such hardware and software has a lack in patching, a configuration, a poor password, security control.


Web jacking

Hacking of website, this is where the hackers gain access and control the website of another person, where he / she can destroy the information of the site as which is relevant to that site. This type of cyber crime is done for the political agendas or purely monetary means.

Information theft

This type of method can be happened when information is saved in computer system are penetrated and physically grab via the hard drive, removable storage media or other virtual medium.

Denial of service attack

Denial of service attack (DOS) and Distributed Denial of service attack (DDOS) generally relates to computer networks. Where the computer of the victim is submerged with more request than it can handle which in the result of causing the PC into crash.

Email bombing

This is another form of internet misuse where an individuals directs a finite number of mails to the victim or an address in attempt to overflow the mailbox, which may be an individual or a company or even mail servers there by ultimately resulting into crashing. There are two types of email bomb which includes mass mailing and list linking.

False Data Entry / Data Diddling 

The changing of data before and during violation into the computer system, or it is an unauthorized access to the computer intending to the false data entry before and during the violation into the computer system. This kind of contingency require raw data just before a computer can processes it and then change it back after the processing is completed.


Data integrity / Salami Attacks

This kind of crime consist of number of smaller data security attacks together end resulting in one major attack. This kind of attacks normally takes place in the financial institutions or for the purpose of committing financial crimes. This kind of attack mostly happens in banks where employees can steal the small amount and its very difficult to detect or trace. 




Trojan Attacks 

A program or a programs mask themselves as valuable tools but execute damaging task to the computer. These programs are against the law which normally gains control over another system by assuming the role as an authorized program. The most common form of a Trojan is through E-mail.


Logic bombs

Basically they are set of instructions secretly executed into a program if the particular condition is true as a result cause harmful effects for the computer system. These programs are produced to do something when a specific event occurs known as trigger event


Virus / worm attacks 

Viruses are programs that has ability to embed themselves to any file. The program then copies itself and spread to other computers on a network which cause harmful effects on them, either by modifying or erasing it. However, worms are slightly different from viruses, they don't need to attach themselves to the files but make useful copies of them and do this consistently till they consume up all the available space on the computer's memory.


2 comments:

  1. very informative, I read that from top to bottom it was very interesting, thanks

    ReplyDelete