Introduction to Cyber Crime

Computer presence in our daily life is very obvious; it has become the major tool used in many sectors not only at the public levels such as governments and companies but also at the level of private individuals. Many of us would be in big difficulty if found suddenly without computers. With this huge role played by computers in our lives, many fears and worries arise. Much attention is paid to make the use of this important tool secure and reliable, and as integrated and functional as possible. Today computer has come to the long way, with the neural network and nano-computing promising to turn every atom into a glass of water into a computer capable of performing a billion operation per second. Cyber crime has its evil having its origin in the growing dependence on computers in the modern life. In a day and age when everything from the microwave ovens and refrigerator to nuclear power plant is being run on computers, cyber crime has assumed rather sinister implications. The cyber crime is an unlawful act in which computers is/ are used as a means of committing a crime against a person, property or government. Babu & Parishat,2004). The terms ³cybercrime,´ "computer crime", "Information Technology crime," and "hightech crime" are often used inter-changeably to refer to two major categories of offenses: in the first, the computer is the target of the offense; attacks on network confidentiality, integrity and/or availability -- i.e. unauthorized access to and illicit tampering with systems, programs or data ± all fall into this category. the other category consists of traditional offenses -- such as theft, fraud, and forgery ± that are committed with the assistance of or by means of computers, computer networks and related information and communications technology. Computers can also play an incidental role in the commission of a traditional offense, as when a blackmailer uses a computer to generate blackmail letters (or e-mails) or a drug dealer who uses Quicken to track his drug purchases and sales. Cybercrimes range from economic offenses (fraud, theft, industrial espionage, sabotage and extortion, product piracy, etc.) to infringements on privacy, propagation of illegal and harmful content, facilitation of prostitution and other moral offenses , and organized crime. At its most severe, cybercrime borders on terrorism, encompassing attacks against human life and

against national security establishments, critical infrastructure, and other vital veins of society. Terrorism encompasses actions intended to provoke a state of terror in the general public, a group of persons or particular persons Terrorist acts cause grave harm to society by disrupting civil order and/or causing mass terror, loss of life, physical destruction or economic hardship In cyber terrorism, as in cybercrime, the "cyber" component usually refers to perpetrating qualitatively new offenses enabled by information technology or integrating cyberspace into more traditional activities (such as planning, intelligence, logistical capabilities, finance, etc.) The categories may also overlap, as they frequently do in the cases of capable, computer-savvy offenders. As this survey demonstrates, cybercrimes are complex and sometimes elusive phenomena; there is no comprehensive, globally accepted definition that separates the sensational from the sensible and scientific. The following scenarios -- all quite real and frequent occurrences --illustrate the range of activities that can be considered cybercrimes.

Sign up to vote on this title
UsefulNot useful