Cyber Crimes An Overview IMRAN MUJADDID RABBANI M. Phil Computer Science Instructor IT. Punjab Judicial Academy What is ?. All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system. COMPUTER CRIME is any crime where Computer is a target. Computer is a tool of crime Computer is incidental to crime Why? Everybody is using COMPUTERS.. From white collar criminals to terrorist organizations And from Teenagers to Adults Conventional crimes like Forgery,, extortion, kidnapping etc.. are being committed with the help of computers New generation is growing up with computers MOST IMPORTANT - Monetary transactions are moving on to the INTERNET Profile of Cyber Criminal Disgruntled employees.. Teenagers.. Political Hacktivist Professional Hackers.. Business Rival.. Ex-Boy / Girl Friend.. Divorced ... etc Victims Gullible Desperados and greedy people Unskilled & Inexperienced Unlucky people 40,000,000,000,000,000,000 Bytes of information goes online each year Information Sources News The US has twice as many shopping centers as High Schools “In each of past 8 years, more Americans have declared bankruptcy than graduated from college” Authors, Affluenza (2005) The most infamous unsolved Computer Crimes (that we know about) 1. The WANK Worm (October 1989) WANK worm hit NASA offices in Greenbelt, Maryland. WANK (Worms Against Nuclear Killers) ran a banner (pictured) across system computers as part of a protest to stop the launch of the plutonium-fueled, Jupiter-bound Galileo probe. Conti… Ministry of Defense Satellite Hacked (February 1999) CD Universe Credit Card Breach (January 2000) Military Source Code Stolen (December 2000) Anti-DRM Hack (October 2001) Criminal Devices CREDIT CARD FRAUD Types Types of Cyber Crimes Email bombing Data diddling Salami Attack Denial of Service attack Virus / worm attacks [ Love Bug / ILOVEYOU] Dear Friend, This message might meet you in utmost surprise, however, it’s just my urgent need for foreign partner that made me to contact you for this transaction. I am a banker by profession from Burkina Faso in West Africa and currently holding the post of Director Auditing and Accounting unit of the bank. I have the opportunity of transferring the left over funds ($7.2million) of one of my bank clients who died along with his entire family on 31 July 2000 in a plane crash. You can confirm the geniuses of the deceased death by clicking on this web site http://news.bbc.co.uk/1/hi/world/europe/859479.stm Hence, I am inviting you for a business deal where this money can be shared between us in the ratio of 60/40. send your private phone number to call you, If you agree to my business proposal. Further details of the transfer will be forwarded to you as soon as I receive your return mail. Have a great day. Your Faithfully Mr Maher Akoula Age :58 years. Home Address:10-12/avenue.Kanazoe. B:P 1508 Ouaga. Burkina-faso + 226 78 34 79 49. + 226 78 73 24 34 Yearly Dollar Loss (in millions) 10 most common Complaints Categories Hacker? The best criminal hacker is the one that isn't caught—or even identified. Hacking Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user. What is Virus? The virus is basically malevolent computer program which has the capability to cause havoc in several ways. The greatest chaos of computer virus is the loss of precious information stored on your computer hard rive. Virus Computer virus have become today’s headline news With the increasing use of the Internet, it has become easier for virus to spread Virus show us loopholes in software Most virus are targeted at the MS Windows OS Trojan / Trojan Horse Has the ability to reproduce infected files with same or relatively same format. Areas to Infect Binary Executable files Boot Sector Master Boot Record Auto run Script Files How Hacker Works? Hit & Trial Stolen Social Engineering Social Engineering First Name Last Name Sur Name Nick Name Wife Name Beloved Name Favorite Place Date of Birth Date of Wedding Vehicle Number Mobile Number Last four Digits of Phone Number Favorite word Favorite Phrase Etc. Imprisonment The penalty for illegally accessing a computer system ranges from 6 months to 5 years. The penalty for the unofficial modification on a computer ranges from 5 to 10 years. The individual who hacks the computer or computer devices will get an imprisonment up to 3 years or a fine. Reference: www.spamlaws.com
© Copyright 2026 Paperzz