Cyber Crime
Cyber crime, or computer related crime, is
crime that involves a computer and
a network.[1] The computer may have been used in the commission of a
crime, or it may be the target.[2] Cybercrimes can be defined as: "Offences that are
committed against individuals or groups of individuals with a criminal motive
to intentionally harm the reputation of the victim or cause physical or mental
harm, or loss, to the victim directly or indirectly, using modern
telecommunication networks such as Internet (networks including but not limited
to Chat rooms, emails, notice boards and groups) and mobile phones
(Bluetooth/SMS/MMS)".[3] Cybercrime may threaten a person or a nation's security
and financial health.[4] Issues surrounding these types of crimes have become
high-profile, particularly those surrounding hacking, copyright infringement, unwarranted mass-surveillance, child pornography, and child grooming. There are also problems of privacy when confidential information is intercepted or disclosed, lawfully or
otherwise. Debarati Halder and K. Jaishankar further define cybercrime from the
perspective of gender and defined 'cybercrime against women' as "Crimes
targeted against women with a motive to intentionally harm the victim
psychologically and physically, using modern telecommunication networks such as
internet and mobile phones".[3] Internationally, both governmental and non-state actors
engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity
crossing international borders and involving the interests of at least one
nation state is sometimes referred to as cyberwarfare.
Fraud and financial
crimes
Computer fraud is any dishonest misrepresentation of
fact intended to let another to do or refrain from doing something which causes
loss. In this context, the fraud will result in obtaining a benefit by:
·
Altering in an
unauthorized way. This requires little technical expertise and is common form
of theft by employees altering the data before entry or entering false data, or
by entering unauthorized instructions or using unauthorized processes;
·
Altering, destroying,
suppressing, or stealing output, usually to conceal unauthorized transactions.
This is difficult to detect;
·
Altering or deleting
stored data;
Other forms of fraud may be facilitated using computer systems,
including bank fraud, carding, identity theft, extortion, and theft of classified
information.


Comments
Post a Comment