1. Explain how the Internet has aided criminal activity.
Internet crime is any crime or ill-gotten on-line activity committed on the web, through the web or exploitation the web. The widespread web crime development encompasses multiple world levels of legislation and oversight. within the difficult and ceaselessly ever-changing IT field, security consultants ar committed to combating web crime through preventative technologies, like intrusion detection networks and packet sniffers. Internet crime could be a sturdy branch of law-breaking. fraud, web scams and cyberstalking ar the first varieties of web crime. as a result of web crimes sometimes have interaction folks from varied geographic areas, finding and penalizing guilty participants is sophisticated. The most popular crime are listed below.
- Password trafficking
- Credit card theft and fraud
- Internet bomb threats
- Personal data hacking
- Cyber bullying and harassment
- Virus spreading
- Classified global security data theft
- Illegal weapon trafficking
- Online child pornography
- Counterfeit trademarks
- Domain name hijacking
2. Provide three (3) specific examples of how the Internet has aided criminal activity.
Hacking:
Two BPO staff gained black access to their company’s automatic data processing system by hacking with the passwords. They conspired with son of a mastercard holder and illicitly exaggerated the credit limit of the cardboard and altered the communication address so mastercard statement ne'er reaches the initial card holder. The credit card company was cheated regarding Rs. 7.2 laks.
Blackmailing:
A city based mostly NRI was lured by anonymous ladies on web UN agency when winning his confidence and love started blackmailing him below the gloss that the primary ladies with whom the NRI got befriended had committed suicide and police is work the case and seeking NRI’s details. The suspect additionally sent pretend copies of the letters from CBI, High Court of city, the big apple police and geographic area University etc. The NRI by that point had paid regarding Rs. 1.25 large integer to the suspect.
Cyberstalking:
One Mrs. Ritu Kohli complained to the police against the an individual World Health Organization was victimisation her identity to talk over the web at the web site computer network.mirc.com, principally within the metropolis channel for four consecutive days.
3. Identify the types of crime that traditionally have been non-digital in nature are now best abetted by Internet activity.
There is no universally accepted classification of net crimes. At a basic level, these kinds of crimes is divided into four general categories: on-line assault, on-line fraud, on-line thieving, and on-line intrusion. Several specific kinds of net crime exist inside every of those basic classes. whereas revealed estimates on the extent of every form of net crime area unit few, and alter daily, offered data suggests that every of these crimes area unit growing in scope (in terms of variety of victims, variety of offenders, and cost). These four categories of net crime and a few of the a lot of common sorts of net crimes at intervals these classes area unit defined.
Online Assault :
Online assault involves violence perpetrated via the web, like threats or unwanted sexual advances that result in associate emotional response on the a part of the victim (e.g., feelings of worry or fear). sorts of on-line assault include: cyberbullying, cyberstalking, and on-line sexual exploitation of youngsters.
- Cyberbullying:
This type of crime happens once minors use Internet-capable devices to repeatedly harass, tease, or torment alternative minors. The age of the offender and victim set this crime except for cyberstalking, that involves adults rather than minors as victims/offenders.
- Cyberstalking:
This is a criminal offense of recurrent (i.e., occurring on 2 or a lot of occasions) unwanted contact, harassment, sexual advances, or threats of violence mistreatment social communications technologies (ITC). Most often, cyberstalking involves use of the Internet; but, it should even be perpetrated offline using alternative electronic communications devices, like cell phones. Cyberstalking also can involve tries on the a part of the bad person to wreck their victim's identity, bring them hurt, get to the victim by sign language them up for email bombs, or injury their victim's pc information or instrumentation. Cyberstalking will arouse emotional responses in victims, like worry or annoyance; but, state statutes vary on whether or not such victim responses area unit necessary before the determination that cyberstalking has de jure taken place.
- Online sexual exploitation of children:
This insidious crime happens once a toddler predator uses the Internet to determine on-line relationships with youngsters, sometimes with the intent of taking the connection into the physical world. Chat rooms, message boards, and social networking sites became simple laces for offenders to create these sinister connections with youngsters World Healthy Organization area unit on-line.
Online Fraud:
Online fraud is that the use of deceit or a breach of confidence on-line in an endeavor to profit financially. Among the more common forms of on-line fraud area unit such crimes as auction fraud, lottery/inheritance scams, Nigerian letter schemes, phishing (posing as a legitimate business in an endeavor to win over victims to let out valuable information like checking account numbers and passwords), and others.
Online Theft:
Online felony involves mistreatment the web to steal data, property, or cash from its rightful owner. Identity theft and piracy fall under this class of web crime.
- Identity theft:
This type of crime involves the misuse of a person's personal info while not their consent or information for the needs of committing fraud or thievery. when the victim's personal info (bank account and mastercard numbers) is obtained, offenders usually purchase product or services whereas posing because the victim.
- Online piracy:
Stealing or sharing property victimization the net is associate degree example of on-line piracy. Common targets of piracy area unit standard media like music and videos (movies and television shows), or computer programs like video games and Microsoft workplace. The piracy drawback is combined by peerto-peer (P2P) file-sharing sites, through that these lawlessly traced materials will be distributed.
Online Intrusion:
Online intrusion involves the utilization of the net to invade, harm, or otherwise infect another individual's on-line space, pc programs, or pc systems. The foremost common samples of this sort of on-line crime ar hacking and causing out viruses or worms.
- Hacking:
Any act within which a personal or people arrange to surpass an internet site, network, or laptop system's security measures is taken into account hacking. This act could also be completed to steal personal info, or even merely to indicate off a personality's advanced laptop skills.
- Viruses and Worms:
These programs area unit designed specifically to unfold throughout pc networks, most usually to disrupt operational activity and cut back system potency. The most distinction between the two is that viruses attach themselves to alternative programs, like email, and admit users to unknowingly help unfold them whereas act with others on-line. Worms, however, area unit free functioning. They do not ought to be connected to alternative programs and might merely unfold with none help from users on the network.
4. Describe the role viruses, other malicious code, and phishing attacks play in aiding this criminal activity.
A virus could be a program that may cause harm to a laptop and might replicate itself during a laptop and over the network or net. Virus code is typically buried within the code of another program. Once dead, the virus gets activated and spreads within the system. Viruses and different forms of malicious code ar usually spread as attachments to email messages. Before gap any attachments, be sure you recognize the supply of the attachment. it's not enough that the e-mail originated from AN address you acknowledge. The genus Melissa virus unfold wild because it originated from a well-known address. If files from AN infected laptop are sent as email attachments, it conjointly infects the pc during which the attachment is opened. a pestilence will corrupt or delete files or build a laptop or devices unusable.
Phishing may be a criminal activity victimisation totally different variations of social engineering techniques. Phishers arrange to fraudulently acquire sensitive data, such as passwords and mastercard details, by conceit as a trustworthy person or business in associate transmission. Phishing is usually distributed victimization email or a second message, though phone contact has been used furthermore. Attempts to manage the growing variety of rumored phishing incidents embody legislation, user coaching, and technical measures.
References:
https://www.michigan.gov/documents/cybersecurity/Protect_Your_Computer_and_Your_Identity_209955_7.pdf
http://mpcyberpolice.nic.in/pdf/7.pdf
http://www.techopedia.com/definition/26587/internet-crime