Cybercrime includes a wide range of activities generally however it may be classified into four classes
• Crime against individual
• Crime against property
• Crime against organization
• Crime against society
Crimes against individuals email spoofing a spoofing mail is the formation of email messages by impersonating correspondent.
Email spamming spam is a message also called as junk mail sent with a web link or business proposal clicking on this link or replying to commercial offer sent to a phishing website or set up a mall where in your workstation the sender's of this electronic email are always unidentified.
Crime against Property credit card fraud online fraud and cheating are most money spinning trades those are raising nowadays in the cyberspace it may have diverse forms some of the cases of online fraud and cheating that are uncovered are those referred to credit-card offences contractual crimes offering employment etc.
Intellectual property crimes intellectual property involves a list of Rights any illegal act due to which the owner is deprived entirely or part of the his human rights. It is a crime the very common form of IPRabuse may be known to be software piracy, copyright infringement, trademark and service mark violation theft of a computer source code. The Hyderabad Court has in a landmark judgment has convicted three person and sentenced them to six months custody and fine off rupees 50,000 each forum authorized copying and sell of pirated software.
Against Organization unauthorized access this is generally denoted to and hacking the intent law has however given a different connotation to the term hacking so we will not use the term unauthorized access interchangeably with the term hacking to prevent misperception. As the term used in the IT Act 2000 of India is much wider than hacking.
Denial of service attack in simple words denial of service referred the act by which a user of any website or service denied to use the service or web site. In this category of cyber crime offenders in the web server of the websites and flow a large number of requests to that server this causes the use of maximum bandwidth of the website and it goes slow down not available for sometimes.
Virus attack a computer virus is a type of malware that when executed replicates by implanting the replicas of it probably altered into other computer programs data files or the boot sector of the hard drive. When this reproduction proceeds the affected zones are then said to be infected. Viruses frequently do certain type of dangerous activity on infected hosts such as stealing hard disk space or CPU time retrieving, private information corrupting, data displaying radical often emails on the user’s display spamming their links or logging their keystrokes. However not all viruses can have a damaging consignment or effort to hide themselves the describing features of viruses is that they are self-duplicating computer programs which mount themselves without the users approval
On the other hand computer worm is a separate more than program that copies itself in order to disperse to other computers frequently. It uses a computer network to spread itself depend on security failures on the aim computer to allow it. Unlike a computer virus it does not require to join itself to a prevailing program email bombing. IN email bombing user is sending vast numbers of emails to target address and due to this that email address or mail server crashed. It feels like denial of service impression it says that spamming is a variant of male bonding salami attack.
A salami attack is when minor attacks make up a major attack which becomes untraceable because of its nature. It is also called a salami slicing though salami slicing is frequently used to transport unlawful activities it is only a plan for gaining and benefit over time by collecting it in small increments so it can be used in perfectly legal ways as well the attacker uses an online database to seize the information of customers. i.e. bank credit card details deducted very little amount from every account above a period of time the customers remain unaware of the slicing and hence no complaint is launched thus keeping the hacker away from detection.
Subscribe on YouTube - NotesWorld
For PDF copy of Solved Assignment
Any University Assignment Solution