Header Ads

Cyber Crimes


Crime is the dark side of society. Over the past 2 decades or so computers and the internet have become an integral part of our everyday lives. People of all ages depend on digital technology right from kids who use for games to teenagers who use it for educational and social networking and adults who use it to make life much simpler and more productive. Almost each and every aspect of our life has become digital. Taking advantage of this, criminals have adapted new techniques and armed themselves with the new weapons called as computers and internet.

CYBER CRIME:
In a simpler words it can be defined as the illegal act where computer and internet serves as a location, means and target of the act.  This begins from 2 kinds of people. When people develop some skill set that gives them some sort of advantage over the society some of them will eventually use it to try to exploit and victimize society with their skill set.
->People who want to show off. Exactly some people do this because they want the whole world to see their talent. And some to check how much they know about the programming.
->The second kind of people are those who are greedy for money and sadistic in nature.
If you are the victim with the first kind of people it’s not a big problem but what if you are the victim with the second kind of people….?? What happens…??
Do you know what’s safe on internet…?? What to do when you are victim of cyber crime..??Do you know more than one cyber crime occurs in every 10 seconds and there have recorded losses of over 500 million dollars in one year due to cyber crime. This article is to tell how many types of cyber crimes are there and how can you avoid them…

HACKING: 
It is an act committed by an intruder by accessing your computer system without your permission. People who do this are technology buffs who have expert level skills in one particular software program or language. Even some companies hire these hackers with huge packages just because to know how much strong there modules are. These kind of hackers are known as “WHITE HAT “hackers. These people attempt to break into network systems purely to alert the owners about the flaws.
The other people who do hacking by these techniques
->SQL Injections: It is a technique that allows hackers to play upon the security vulnerabilities of the software that runs a website. This process involves entering portions of SQL code into a web form entry field most commonly usernames and passwords to give the hacker further access to the site backend or to a particular user’s account. When you enter logon information into sign in fields this information is typically converted into SQL command. This command checks the data you’ve entered against the relevant table in the database. If your input data matches the data in the table, you are granted access if not no. SQL injection is usually an additional command that when inserted into the web form tries to change the content of the database to reflect a successful login. It can be also used to retrieve information such as credit card numbers or passwords from unprotected sites.
->Theft of FTP Passwords:
  If your computer is infected with virus when you visit an infected Web page. The virus examines your computer to see if you use any common FTP programs which has stored with username and password. It sends the usernames and passwords to a server controlled by “hackers” automatically. This way Hacker gets your FTP password easily and gets access to your website files so easily. The hackers make an automated FTP connection to your web server and download any HTML or PHP files they find. Hackers modify the files by adding virus code (an “iframe” tag) that spreads the virus by uploading changed files back. Your site starts spreading the virus to new victims. Within a few days, your site will be marked as “This site may harm your computer” on Google, causing the number of visitors to drop dramatically.
->Cross Site Scripting:
In general, cross-site scripting refers to that hacking technique that leverages vulnerabilities in the code of a web application to allow an attacker to send malicious content from an end-user and collect some type of data from the victim.
Cross Site Scripting allows an attacker to embed malicious JavaScript, VBScript, ActiveX, HTML, or Flash into a vulnerable dynamic page to fool the user, executing the script on his machine in order to gather data. The use of XSS might compromise private information, manipulate or steal cookies, create requests that can be mistaken for those of a valid user, or execute malicious code on the end-user systems. The data is usually formatted as a hyperlink containing malicious content and which is distributed over any possible means on the internet.

Virus Dissemination:
Virus are computer programs that attach themselves to system or files to infect them  and have a tendency to circulate to other computers on a network.  When we scan our computer we may observe some kind of viruses such as worm, Trojan horse, etc. Worms don’t need a host cling and they replicate. Trojan horses are of different kind in their manner of propagation. These viruses are executed when we try to call uninfected program they in turn call the viral program. This viral program will get executed before the main program and this can infect every executable file on the computer .Computer viruses are usually spread via removable media or the internet.

LOGIC BOMBS:
A logic bomb also known as slag code is a malicious piece of code which is intentionally inserted into software to execute a malicious task when triggered by a specific event. What happens is when we are running a uninfected code and some other person has injected a logic bomb in our program this makes our program to execute some other task rather than the original one. It may be also used to delete data and other stuff. These logic bombs are mostly used by employees in the IT sector who are not satisfied with the company.

PHISHING :
This is a technique of extracting confidential information such as credit card numbers and username passwords by masquerading as a legitimate enterprise. In simple way to say you would receive a mail from a prestigious company offering something and to click the link they sent to you. If you click on that link the malware would get installed automatically without asking you permission and get all the information.

EMAIL BOMBING AND SPAMMING:
This means sending huge volumes of email to a target address resulting in victim’s email account or mail servers crashing.
Spamming is a variant of email bombing .Here unsolicited bulk messages are sent to a large number of users indiscriminately. Opening links given in  spam mails may lead to phishing.

CYBER STALKING:
This is most common crime which is happening now a days. The information which you put on the social networking sites are used to harasses you. They tell everything about you as if they are following you and sometimes they may also send a email demanding to give money.

DATA DIDDLING:
It can stated in simple way when the original information to be entered is changed either by a person typing in the data a virus that’s programmed to change the data, the programmer of the database or application or anyone else involved in the process of creating, recording, encoding, examining ,checking ,converting or transmitting data. Let me give a simple example of the when the a person of some organization has to pay some money to his clients he chooses for the online payment a maintain a separate database for the online payment once if data diddling is done to this database what happens is it displays that you have already paid money to him but he didn’t actually paid. So there would be loss to the client and company may lose its fame. Electricity board of India was once a victim of this data diddling.

SALAMI SLICING ATTACK:
This is a technique by which cyber criminals steal money or resources a bit at a time so that there’s no noticeable difference in overall size. In other words to say when you use your credit card to buy something of price Rs 573 and  you would get bill of Rs 600 stating that transactions charges. As it is a small amount you won’t care that. Just imagine how many transactions are being take place per day and how many Rs he steals from each person. Though the amount is small the summation of that amount is huge.
These are some of the cyber crimes which happen in our day to day life apart from them there are also many hacking techniques like web jacking, credit card fraud and many more things are happening. As the technology is growing it is giving more and more advantages to the cyber criminals. Be careful…part from them there are also many hacking techniques like web jacking, credit card fraud and many more things are happening. As the technology is growing it is giving more and more advantages to the cyber criminals. Be careful…!!!

#ComputerTech  #9D


No comments