Cyber Crime may be defined in a general way as an unlawful act wherein the computer is either a tool or a target or both.
Cyber Crime can be categorized as
Unauthorized access | ||||||
Unauthorized access to computer systems or networks means any person who secures access or attempts to secure access to a protected system. |
Email bombing | ||||||
Email bombing refers to sending a large amount of emails to the victim resulting in the victim's email account (in case of an individual) or mail server (in case of a company or an email service provider) crashing. |
Data diddling | ||||||
This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed. | ||||||
Salami attack | |||||||||
This attack is used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed, e.g. a bank employee inserts a program into the bank's servers, that deducts a small amount of money (say Rs.5 a month) from the account of every customer. No single account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month. | |||||||||
Internet time theft | ||||||
This connotes the usage by an unauthorized person of the Internet hours paid for by another person. | ||||||
Logic bomb | ||||||
This is event dependent program. This implies that this program is created to do something only when a certain event (known as a trigger event) occurs, e.g. some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date (like the Chernobyl virus). | ||||||