We may define Cyber Crime as-
"criminal activity involving the information technology infrastructure,
including illegal access (unauthorized access), illegal interception (by
technical means of non-public transmissions of computer data to, from or within
a computer system), data interference (unauthorized damaging, deletion,
deterioration, alteration or suppression of computer data), systems
interference (interfering with the functioning of a computer system by
inputting, transmitting, damaging, deleting, deteriorating, altering or
suppressing computer data), misuse of devices, forgery (ID theft), and
electronic fraud".
Cyber crimes by using
computers:-
Cyber crime is a term used broadly to
describe criminal activity in which computers or computer networks are a tool,
a target, or a place of criminal activity. These categories are not exclusive
and many activities can be characterized as falling in one or more categories.
As the new millennium dawned, the
computer has gained popularity in every aspect of our lives. This includes the
use of computers by persons involved in the commission of crimes. Today,
computers play a major role in almost every crime that is committed. According
to DONN PARKER, "For the first time in human history, computers and
automated processes make it possible to possess, not just commit, a crime.
Today, criminals can pass a complete crime in software from one to another,
each improving or adapting it to their needs."
Though, the term cybercrime is widely
used to describing criminal activity in which the computer or network is a
necessary part of the crime, the term is also popularly used to include
traditional crimes in which computers or networks are used to facilitate the
illicit activity, or where a computer or network contains stored evidence of a
traditional crime-
(1)
Computer or network as a tool:-
Cyber crime in which the computer or
network is a tool of the criminal activity include "spamming" and
certain intellectual property and criminal copyright crimes ("IP
piracy"), particularly those facilitated through peer-to-peer networks.
(2)
Computer or network as a target:-
Cyber crime in which the computer or
network is a target of criminal activity include unauthorized access (sometimes
referred to as "computer trespass," "hacking," or
"cracking"), malicious code ("malware"), and
denial-of-service ("DoS" and "DDoS") attacks. Attacks on
critical infrastructure including telecommunication networks and industrial
control systems (SCADA), may result in significant real-world damage,
implicating cyber-terrorism and national security issues.
(3)
Computer or network as a place:-
Cyber crime in which the computer or
network is a place of criminal activity include theft of service, in
particular, telecom fraud (e.g., "phreaking") and certain financial
frauds involving electronic transfers (e.g., "salami slicing"). An
emerging area is "virtual crime," particularly in online gaming or
immersive social network sites where virtual goods are subject to attack or
theft.
• A
few examples of traditional crimes facilitated through the use of computers or
networks include Nigerian 419 or other gullibility frauds (e.g.,
"phishing"), identity theft, child pornography, online gambling,
securities fraud, etc.
• Cyber stalking
is an example of a traditional crime-harassment or stalking-that has taken a
new form when facilitated through computer networks. Moreover, computers or
networks have been used to lure victims of assault, robbery or muggings.
• Sometimes,
information crimes including trade secret theft and economic espionage are considered
cybercrimes when computers or networks are involved.
• Cybercrime
in the context of national security may involve hacktivism (online activity
intended to influence policy), traditional espionage, or information warfare
and related activities.
Courtesy :- Legal Point Foundation
No comments:
Post a Comment