Cyber Crime: Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet.
The computer or device may be the agent of the crime, the facilitator of the crime, or the target of the crime. The crime may take place on the computer alone or in addition to other locations. The broad range of cybercrime can be better understood by dividing it into two overall categories, defined for the purpose of this research as Type I and Type II cybercrime. Let’s take a look at them both:
Type 1 cybercrime
Usually a single event from the perspective of the victim. An example would be where the victim unknowingly downloads a Trojan horse virus, which installs a keystroke logger on his or her machine. The keystroke logger allows the hacker to steal private data such as internet banking and email passwords.
Another common form of Type 1 cybercrime is phishing. This is where the victim receives a supposedly legitimate email (quite often claiming to be a bank or credit card company) with a link that leads to a hostile website. Once the link is clicked, the PC can then be infected with a virus.
Hackers often carry out Type 1 cybercrime by taking advantage of flaws in a web browser to place a Trojan horse virus onto the unprotected victims computer
Any cybercrime that relates to theft or manipulation of data or services via hacking or viruses, identity theft, and bank or e-commerce fraud.
Type 2 cybercrime
Type 2 cybercrime tends to be much more serious and covers things such as cyberstalking and harassment, child predation, extortion, blackmail, stock market manipulation, complex corporate espionage, and planning or carrying out terrorist activities.
It is generally an on-going series of events, involving repeated interactions with the target. For example, the target is contacted in a chat room by someone who, over time, attempts to establish a relationship. Eventually, the criminal exploits the relationship to commit a crime. Or, members of a terrorist cell or criminal organisation may use hidden messages to communicate in a public forum to plan activities or discuss money laundering locations, for example.
More often than not, it is facilitated by programs that do not fit under the classification crimeware. For example, conversations may take place using IM (instant messaging) clients or files may be transferred using FTP.
Types of Cyber Crimes
When any crime is committed over the Internet it is referred to as a cyber crime. There are many types of cyber crimes and the most common ones are explained below:
Hacking: This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed. In the United States, hacking is classified as a felony and punishable as such. This is different from ethical hacking, which many organizations use to check their Internet security protection. In hacking, the criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location.
Theft: This crime occurs when a person violates copyrights and downloads music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI. Today, the justice system is addressing this cyber crime and there are laws that prevent people from illegal downloading.
Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims’ lives more miserable.
Identity Theft: This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history.
Malicious Software: These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system.
Child soliciting and Abuse: This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography. The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting.
Cyber ethics is the philosophic study of ethics pertaining to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society.
Ethics are principles or standards of human conduct. Cyber ethics is a code of responsible behaviour on the Internet. Based on common sense and good judgment, cyber ethics also includes obeying laws that apply to online behavior. When you practice cyberethics, you are more likely to have a safer and enjoyable Internet experience.
Here are a few suggestions:
§ DO use the Internet to communicate and interact with other people. Email and instant messaging make it easy to stay in touch with friends and family members, communicate with work colleagues, and share ideas and information with people across town or halfway around the world. Participating in Internet forums and social networking sites are also great ways to engage with people online.
§ DON'T be a cyberbully. Treat people online the way you would if you were talking to them face-to-face. Be considerate and respectful. Don't be rude or mean, don't use bad language, and don't make threats or attempt to humiliate other people. When you type, make sure your Caps Lock key is off or people might think that you're screaming.
§ DO report cyberbullying. Keep a record of every comment you receive from a cyberbully; contact the cyberbully one time only and tell him to stop bothering you. If behavior doesn't change, then report the bully to the proper authorities.
§ DON'T encourage cyberbullies. If someone you encounter online insults you or says something threatening, just ignore them. Engaging or arguing with cyberbullies might encourage even worse behavior. If you refuse to respond, there is a good chance they will move on and stop bothering you. If a cyberbully harrasses you through email or instant messaging, you can also use the built-in filters to prevent further contact.
§ DO use the Internet for research and information. The Internet is like the world's largest library, packed full of information on every conceivable subject, from ancient history to current events, from math and science to art and anthropology. The information you find online can help you to manage your life, to improve your work, and to make important decisions with greater confidence.
§ DON'T use copyrighted information as your own. The Internet has such a wealth of information that it can be tempting to copy and reuse information you find online. Presenting information from the Internet as your own work is not only dishonest, it could be illegal. If the material is copyrighted, then by law it belongs to someone else. If you use it without permission or appropriate attribution, you might be violating copyright laws.
§ DO enjoy music, videos and games on the Internet. There are many websites where you can sample new music, watch movies and other videos, or play and learn about computer games.
§ DON'T download or share copyrighted information. If you download and distribute copyrighted music, videos, games or other materials over the Internet without proper payment or permission, you are stealing.
§ DO shop, bank and pay bills online. The Internet makes it easy and convenient to manage many tasks online-which can save time and money.
§ DON'T share personal information too easily. Be careful about the type and amount of information you share with people online. Beware especially of people you don't know or questionable websites that might not be secure. Revealing personal information can make you a target for online criminals or cyberbullies. To help ensure you're on a secure site, check to see if the URL begins with https (the "s" stands for "secure"). Also, look for a green address bar or a security certificate-represented by an icon such as an unopened lock-somewhere in the browser window. Double-click the certificate to make sure the name on the web address matches the certificate.
§ DO use the Internet to expand your social and business networks. Social and business networking sites can help you locate old friends and make new ones, create and maintain valuable professional contacts, and build your online reputation.
§ DON'T lie. When you're interacting with people online, be honest, and never pretend to be someone else. If someone asks you a question that makes you uncomfortable or asks you to reveal too much personal information, just don't answer.