cyber crime full report
#14

[attachment=12255]
1. INTRODUCTION
The first recorded cyber crime took place in the year 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage.
In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime.
"Cyber crime" is not a rigorously defined concept. For our purposes, consider it to embrace criminal acts that can be accomplished while sitting at a computer keyboard. Such acts include gaining unauthorized access to computer files, disrupting the operation of remote computers with viruses, worms, logic bombs, Trojan horses, and denial of service attacks; distributing and creating child pornography, stealing another's identity; selling contraband, and stalking victims. Cyber crime is cheap to commit (if one has the know-how to do it), hard to detect (if one knows how to erase one's tracks), and often hard to locate in jurisdictional terms, given the geographical indeterminacy of the net.
2. WHAT IS CYBER CRIME
Computer crime or cybercrime is a form of crime where the Internet or computers are used as a medium to commit crime. Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet.
"The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb".
– National Research Council, "Computers at Risk", 1991.
Computer crime or cybercrime is a form of crime where the Internet or computers are used as a medium to commit crime. Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet.
Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet. Cyber crime can be classified in to 4 major categories as;
(A) Cyber crime against Individual
(B) Cyber crime Against Property
© Cyber crime Against Organization
(D) Cyber crime Against Society
(A)Against Individuals:
 Email spoofing :
A spoofed email is one in which e-mail header is forged so that mail appears to originate from one source but actually has been sent from another source
 Spamming:
Spamming means sending multiple copies of unsolicited mails or mass e-mails such as chain letters.
 Cyber Defamation:
This occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e-mails containing defamatory information.
 Harassment & Cyber stalking:
Cyber Stalking Means following the moves of an individual's activity over internet. It can be done with the help of many protocols available such as e- mail, chat rooms, user net groups etc.
 Phishing:
Phishing is a way of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
(B) Against Property:
 Credit Card Fraud :
Credit card fraud is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account.
 Intellectual Property crimes :
These include Software piracy, illegal copying of programs, Distribution of copies of software, Copyright infringement, Trademarks violations, Theft of computer source code.
 Internet time theft:
The usage of the Internet hours by an unauthorized person which is actually paid by another person.
(A)Against Organization
 Denial of Service:
When Internet server is flooded with continuous bogus requests so as to denying legitimate users to use the server or to crash the server.
 Virus attack:
A computer virus is a computer program that can infect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of it. Viruses can be file infecting or affecting boot sector of the computer. Worms, unlike viruses do not need the host to attach themselves to.
 Email Bombing:
Sending large numbers of mails to the individual or company or mail servers thereby ultimately resulting into crashing.
 Salami Attack:
When negligible amounts are removed & accumulated in to something larger. These attacks are used for the commission of financial crime.
 Logic Bomb:
It is an event dependent program, as soon as the designated event occurs, it crashes the computer, release a virus or any other harmful possibilities.
 Trojan horse:
an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing.
 Data diddling:
This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed.
(D) Against Society
 Forgery :
Currency notes, revenue stamps, mark sheets etc can be forged using computers and high quality scanners and printers.
 Cyber Terrorism :
According to the U.S. Federal Bureau of Investigation, cyber terrorism is any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents."
 Web Jacking :
Hackers gain access and control over the website of another, even they change the content of website for fulfilling political objective or for money.
3. AGAINST INDIVIDUALS
3.1. E-MAIL SPOOFING:

It is a term used to describe (usually fraudulent but can sometimes be legitimate - see below) e-mail activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source. E-mail spoofing is a technique commonly used for spam e-mail and phishing to hide the origin of an e-mail message. By changing certain properties of the e-mail, such as the From, Return-Path and Reply-To fields (which can be found in the message header), ill-intentioned users can make the e-mail appear to be from someone other than the actual sender. The result is that, although the e-mail appears to come from the address indicated in the from field (found in the e-mail headers), it actually comes from another source.
Occasionally (especially if the spam requires a reply from the recipient, such as the '419' scams), the source of the spam e-mail is indicated in the Reply-To field (or at least a way of identifying the spammer); if this is the case and the initial e-mail is replied to, the delivery will be sent to the address specified in the Reply-To field, which could be the spammer's address. However, most spam emails (especially malicious ones with a Trojan/virus payload, or those advertising a web site) forge this address too, and replying to it will annoy an innocent third party.
Prior to the advent of unsolicited commercial email as a viable business model, "legitimately spoofed" email was common. For example, a visiting user might use the local organization's SMTP server to send email from the user's foreign address. Since most servers were configured as open relays, this was a common practice. As spam email became an annoying problem, most of this victim uses antispam techniques.
E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than you is illegal in some jurisdictions.
E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the main protocol used in sending e-mail, does not include an authentication mechanism. Although an SMTP service extension allows an SMTP client to negotiate a security level with a mail server, this precaution is not often taken. If the precaution is not taken, anyone with the requisite knowledge can connect to the server and use it to send messages. To send spoofed e-mail, senders insert commands in headers that will alter message information. It is possible to send a message that appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: report on government regulation for controlling cyber crime, latest full report on internet security and cyber crime, use case diagram for cyber crime, seminar report on invegtigation methods in cyber crime, cyber crime awareness, anchoring script for cyber crime seminar, paper presentation topics for cyber crime,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: cyber crime full report - by satabdi dash - 09-08-2010, 07:19 PM
RE: cyber crime full report - by projectsofme - 13-10-2010, 09:09 PM
RE: cyber crime full report - by seminar class - 12-03-2011, 04:00 PM
RE: cyber crime full report - by seminar class - 23-03-2011, 02:22 PM
RE: cyber crime full report - by seminar class - 26-03-2011, 02:50 PM
RE: cyber crime full report - by seminar class - 28-03-2011, 09:23 AM
RE: cyber crime full report - by seminar class - 05-04-2011, 09:34 AM
RE: cyber crime full report - by seminar class - 18-04-2011, 09:21 AM
RE: cyber crime full report - by seminar paper - 15-02-2012, 09:54 AM
RE: cyber crime full report - by seminar paper - 18-02-2012, 10:33 AM
RE: cyber crime full report - by seminar paper - 02-03-2012, 01:58 PM
RE: cyber crime full report - by seminar details - 18-10-2012, 01:46 PM
RE: cyber crime full report - by Guest - 27-02-2013, 10:53 PM
RE: cyber crime full report - by Guest - 03-04-2013, 12:53 PM
RE: cyber crime full report - by computer topic - 04-04-2013, 01:01 PM
yzurkj ltifzs kwmink - by MichaelPn - 17-03-2014, 09:40 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,827 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,769 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,930 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,645 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,008 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,102 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,446 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,583 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,316 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,420 01-05-2015, 03:36 PM
Last Post: seminar report asees

Forum Jump: