Cybercrime is a term used broadly to describe criminal activity in which computers or networks are a tool, a target, or a place of criminal activity. These categories are not exclusive and many activities can be characterized as falling in one or more categories.
Although the term cybercrime is usually restricted to describing criminal activity in which the computer or network is an essential part of the crime. This term is also used to include traditional crimes in which computers or networks are used to enalbe the illicit activity.
Examples of cybercrime in which the computer or network is a tool of the criminal activity include spamming and certain intellectual property and criminal copyright crimes, particularly those facilitated through peer-to-peer networks.
Examples of cybercrime in which the computer or network is a target of criminal activity include unauthorized access (i.e, defeating access controls), malicious code, and denial-of-service attacks.
Examples of cybercrime in which the computer or network is a place of criminal activity include theft of service (in particular, telecom fraud) and certain financial frauds.
Finally, examples of traditional crimes facilitated through the use of computers or networks include Nigerian 419 or other gullibility or social engineering frauds (e.g., "phishing"), identity theft, child pornography, online gambling, securities fraud, etc. Cyberstalking is an example of a traditionl crime -- harrassment -- that has taken a new form when facilitated through computer networks.
Additionally, certain other information crimes, including trade secret theft and economic espionage, are sometimes considered cybercrimes when computers or networks are involved.
Cybercrime in the context of national security may involve hacktivism (online activity intended to influence policy), traditional espionage, or information warfare and related activities.
Another way to define cybercrime is simply as criminal activity involving the information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.
Cybercrime types
unathorized access (i.e., defeating access controls)
Hacking
Cyberterrorism
Cyberstalking and online harassment
Fraud and identity theft, including phishing
Information warfare
Denial-of-service attack
Malicious code (including use of a virus or trojan horse
Virtual crime, such as the theft of virtual property
2006-11-13 02:58:39
·
answer #1
·
answered by Baba 2
·
0⤊
0⤋
"i;m a engg coll. student."
not with that spelling you're not.
Oh well: http://en.wikipedia.org/wiki/Cybercrime
2006-11-13 09:04:00
·
answer #3
·
answered by Anonymous
·
0⤊
0⤋
http://www.cert.org/
http://www.dhs.gov/index.shtm
https://www.cia.gov/
http://www.secretservice.gov/index.shtml
http://www.fbi.gov/
http://www.gcn.com/
http://www.gsnmagazine.com/
2006-11-13 09:14:22
·
answer #7
·
answered by Sandy 4
·
0⤊
0⤋