Page 202 - PYTHON-12
P. 202

As the usage of internet has been growing at an exponential rate, it has become very important to
               protect individual users and organizations from unauthorized intruders into the system.

               8.27 CYBER CRIMES


               When any crime is committed over the internet, it is referred to as cyber crime. There are many
               types of cyber crimes and the most common ones are explained below:
                   1.  Hacking: Gaining knowledge about someone’s private and sensitive information by getting
                       access to their computer system illegally is known as hacking. This is different from ethical
                       hacking,  which many organizations use to check their internet security protection. In
                       hacking, a criminal uses a variety of software so as to enter a person’s computer and that
                       person may not be aware of his computer being accessed from a remote location.
                   2.  Theft: Theft  occurs  when  a person  downloads music, movies,  games and software by
                       violating copyright. There are even peer-sharing websites which encourage software piracy
                       and many of these websites are now being targeted by the Federal Bureau of Investigation
                       (FBI).

                   3.  Cyber  Stalking: Cyber stalking  is a kind of online harassment where the victim gets
                       unwanted abusive online messages and emails. Typically, these stalkers know their victims
                       and instead of resorting to offline stalking, they use the internet to stalk. If they notice that
                       cyber stalking is not having the desired effect, they begin offline stalking along with cyber
                       stalking to make their victim’s life miserable.
                   4.  Identity Theft: This has become a major problem with people using the internet for cash
                       transactions and banking services. In this cyber crime, a criminal accesses data about a
                       person’s bank  account, credit card, social security  card, debit card and other  sensitive
                       information to gain money or to buy things online in the victim’s name that can result in
                       major financial loss for the victim and even spoil the victim’s credit history.

                   5.  Malicious Software: These are internet-based software or programs known as pirated
                       software that are used to disrupt proper functioning of the network. The software is used to
                       steal sensitive information or data that can cause damage to existing software in a computer
                       system.

                   6.  Child Pornography: In this cyber crime, defaulters create, distribute or access materials
                       that sexually exploit underage children. The criminals solicit minors via chat rooms for the
                       purpose of child pornography. The FBI has been spending a lot of time monitoring chat
                       rooms frequented by children with the hope of reducing and preventing child abuse and
                       soliciting.
           Computer Science with Python–XII  8.48  8.  technology to fraudulent endeavours has become that much greater. The use of telephone for
                       Sales and Investment Fraud: With the increase in e-commerce, the application of digital
                   7.

                       fraudulent sales pitches, deceptive charitable solicitations or bogus investment overtures
                       is becoming increasingly common. There are some fraudulent sites that sell poor quality
                       products at cheaper rates. They also promise the customers heavy discounts and freebies.
                       Electronic Funds Transfer Fraud: A cyber crime occurs when there is a  transfer of
                       funds which may be intercepted and diverted. Valid credit card numbers can be hacked
                       electronically and then misused by a fraudulent person or organization.
   197   198   199   200   201   202   203   204   205   206   207