Professional Documents
Culture Documents
INTRODUCTION
When we want to talk about cybercrime, what has crossed our mind are hacking,
copyright infringement and so on and so forth. Actually there are so many types of
cybercrime in this world that might surprise us without us knowing it. According to
Wikipedia, computer crime, or cybercrime, refers to any crime that involves
a computer and a network1. The computer may have been used in the commission of a
crime, or it may be the target. It means that the owner of the computer has detected some
changes in his or her computer especially when it involves data or password. Net
crime refers to criminal exploitation of the Internet. Such crimes may threaten a nations
security and financial health. These issues become high profile, especially in those
cracking, copyright infringement, child pornography so on and so forth. There are also
problems of privacy when confidential information is lost or intercepted, lawfully or
otherwise.
According to Parthasarathi Pati , one of the professors in India refers the cyber crime as a
generalized as unlawful acts wherein the computer is either a tool or target or both 2.
The computer may be used as a tool in the following kinds of pornography, online
gambling, forgery, cyber stalking. The computer may however be target for illegal acts in
the following cases- unauthorized access to computer/ computer system/ computer
networks, theft of information contained in the electronic form, e-mail bombing, logic
bombs and so on. Usually the Trojan attacks, internet time thefts, web jacking, theft of
computer system, physically damaging the computer system without the user knowing it.
http://en.wikipedia.org/wiki/Computer_crime
http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
1|Page
There are also definitions of cyber crimes and according to Davis and Hutchison: 1997,
there
are
two
kind
categories
of
cyber-crime
that
have
been
created.
The first category of cyber-crime is defined where the computer is the tool of the crime.
The crimes include child pornography, criminal harassment, fraud, intellectual property
violations and illegal sales. The second category is defined where the computer is the
object of the crime. Cyber-crime consists of specific crimes dealing with computers and
networks all around the world. These are new crimes that are specifically related
to computer technology and the Internet. For example, hacking or unauthorized use
of computer systems, creation and malicious dissemination of computer viruses.
As we have gone through with these definitions of cyber-crime , the best definition for
cyber crimes that suits our topic is that cyber crime is an illegal acts that done by an
individual or groups of people to hack or access others computer without permission . It
can
be
dangerous
to
our
security
nationally
or
internationally.
Cyber-crime is a national and international concern that is having a really serious impact
on law enforcement at all levels. Cyber-crime should have received increased attention
from federal, provincial and territorial governments, as well as the police in the
community. Until now, there are no national data on this important issue. We will discuss
more about
Cybercrime is criminal activity done using computers and the Internet. Most of the
internet users have gone through with this without knowing it. This includes anything
from downloading illegal music files to stealing millions of dollars from user online bank
accounts. Cybercrime also includes such as creating and distributing viruses on other
computers
or
posting
confidential business
information
on the
Internet.
2|Page
3|Page
4|Page
threatening to detonate a nuclear device in the college campus. The alleged e- mail was
sent from the account of another student to the vice president for student services.
However the mail was traced to be sent from the account of Rajesh Manyar
(ii) Spamming
Spamming means sending multiple copies of unsolicited mails or mass e-mails such as
chain letters.
(iii) Cyber Defamation
This occurs when defamation takes place with the help of computers and / or the
internet. For an example someone publishes defamatory matter about someone on a
website or sends e-mails containing defamatory information.
(iii) Harassment & Cyber stalking
The Oxford dictionary defines stalking as "pursuing stealthily". Cyber stalking involves
following a person's movements across the Internet by posting messages (and mostly
threatening) on the bulletin boards frequented by the victim, entering the chat-rooms
frequented by the victim, constantly bombarding the victim with emails etc.
2) Organised hackers
These kinds of hackers are mostly organised together to fulfil certain objective. The
reason may be to fulfil their political bias, fundamentalism, etc. The Pakistanis are
said to be one of the best quality hackers in the world. They mainly target the Indian
government sites with the purpose to fulfil their political objectives. The NASA as
well as the Microsoft sites is always under attack by the hackers.
Examples of crimes done under this category are unauthorised access, email spoofing,
Trojan , viruses and so on.
5|Page
6|Page
7|Page
In addition, the ongoing economic crisis across the world will also boost cyber crimes.
The problem of insufficient awareness about cyber security or Internet-safety practices
among Malaysians surfing on the Web continues to pose a big challenge. For example,
some users do not own a distinct password while many are not updating their security
software. Commenting on this, Malaysian Police said that to an unwary person, a
fraudulent website appears to be the bank's real website. Similarly, an innocent recipient
thinks that an e-mail announcing a 'prize win' is genuine. Therefore, it is hardly surprising
that online crimes involving banking fraud and as in US the cyber-crime offences also
increases a lot lately. There are a lot of complaints have been filed to offender. As we
know that it is very hard to find the offender, so some cases consume time and some
never solved. According to the FBI (Federal Bureau of Investigation) cases in US are
getting worse every year as the offender still doing their job very well by covering tracks
that they did.
10 | P a g e
SUGGESTIONS
Prevention methods:
1. Firewalls
2. Frequent password changing
3. Safe surfing
4. Frequent virus checks
5. Email filters
Firewalls
These are programs, which protect a user from unauthorized access attacks while on a
network. They provide access to only known users, or people who the user permits.
Frequent password changing
With the advent of multi-user systems, security has become dependent on passwords.
Thus one should always keep passwords to sensitive data secure. Changing
them frequently, and keeping them sufficiently complex in the first place can do this.
Safe surfing
This is a practice, which should be followed by all users on a network.
Safe surfing involves keeping ones e-mail address private, not chatting on open systems,
which do not have adequate protection methods, visiting secure sites. Accepting data
from only known users, downloading carefully, and then from known sites also
minimizes risk.
Frequent virus checks
One should frequently check ones computer for viruses and worms. Also any external
media such as floppy disks and CD ROMS should always be virus checked before
running.
Email filters
These are programs, which monitor the inflow of mails to the inbox and delete
automatically any suspicious or useless mails thus reducing the chances of being bombed
or spoofed.
11 | P a g e
CONCLUSIONS
As we have talked and discussed about definition of cyber crime, types of cyber crime,
comparison between Malaysia and USA, it comes to conclude that these offences
happening because our lifestyles. We must accept that this world without barrier has
made some people in this world think that they can do anything. Just like normal crime,
but they do that through computers. For them as long as no action taken, it is going to be
fun for them. With the information highway having entered our very homes, we are all at
increasing risk of being affected by Cybercrime. Everything about our lives is in some
manner affected by computers. Under the circumstances its high time we sat up and took
notice of the events shaping our destinies on the information highway. Cybercrime is
everyones problem. And its time we did something to protect ourselves. Information is
the best form of protection. We can get a lot of information through internet, books,
journal and mass media. So do not wait until the last minute to prevent these cybercrime
from invading your private and space.
12 | P a g e
REFERENCES
1) http://en.wikipedia.org/wiki/Computer_crime
Moore, R. (2005) "Cybercrime: Investigating High-Technology Computer Crime,"
Cleveland, Mississippi:
Anderson Publishing.
2) http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
3) http://arjunvenkatraman.com/work/techno/cybercrime.html#_Toc139026714
13 | P a g e