Cyber Crime – A Real Threat To The World !!
Today’s world have become more and more dependent on the use of computers and networks and they have become central to each and every field existing, so the grown importance of the computers have lead to cyber crime also called as Computer crime. In broader terms, cyber crime could be defined as the illegal digital activities carried out by the cyber threats to commit fraud, affect the numerous information sensitive fields, hinder the privacy of individuals or group of individuals or stealing one’s identity etc. There are many types of cyber crimes, the most common ones being Hacking,Cyber stalking, Identity theft,Denial of services attacks,virus/worm attacks, Trojans and key-loggers, Internet time theft. In this section, we have provided all the real world threats related to the cyber crime and also listed some of the incidents and with different types of computer attacks i.e. DoS, DDoS, Virus, Worms, Trojans etc. Still if it contains any error please do let us know. Any type of suggestions will be highly appreciated.
Types of Computer Attacks
- Denial of Service Attack ( DoS)
- Distributed Denial of Service Attack (DDoS)
Now, starting with the types of cyber crimes one by one, Denial of Service attack(DoS) or Distributed Denial of Service attack(DDoS) is a type of web attack to make the targeted computer dysfunctional in order to make its resources unavailable to its users.
DoS is carried out by flooding the targeted computer with a huge number of requests that it can handle, this sudden increase in traffic causes the site to load slowly for its legitimate users resulting in crashing of web-server or computer and hence making the resources of the computer out of reach to its authorized users. An illusration of DoS attacks is the breaking down of websites like yahoo.com, amazon.com and cnn.com.
Virus and Worms
Virus : Another cyber threat is virus/worm attacks. Viruses are the programs that can replicate in order to spread from one computer to other computer. Viruses target computers by deleting data and stealing information. They are also responsible for changing the computer’s behavior in some way. Viruses are usually spread through attachments found in an e- mail or instant messaging services. These attachments of funny images, greeting cards, or audio and video files are the sources of virus. Viruses can also spread through downloads on the Internet. Almost all the viruses are attached to an executable file, which means a virus may exist on a system but it will not be active until a user runs or opens the malicious file or program.
Worms are similar to viruses in replicating from computer to computer. The main difference between a virus and a worm being that worm acts more independently of other files whereas virus is dependent on its host program. “Brain” is considered to be the first virus developed in 1986 by two brothers. VBS_LOVELETTER developed in the year 2000 became one of the most prevalent viruses.
Trojans: On the other hand Trojans do not replicate themselves, unlike viruses and worms. They are named after the Trojan horse because they disguise themselves as legitimate,the Trojan virus is an unauthorized program what seems to be authorized program, thereby concealing what it is doing. And a Keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press. Keyloggers is used to monitor the network usage of people without their direct knowledge. Malicious users can install keylogger in the public computers to steal their passwords and private information.
An illustration can be used to define Internet theft, which involves an engineer who stole the login name and password of a customer and misused the internet connection he had set up. Therefore, Internet theft, another cyber crime, is defined as the usage of internet hours by an unauthorized person, who has deceitfully got the details of the internet access which is paid by an another person.Therefore, to conclude, cyber crimes have devastating effect and we need to have technical expertise and resources to quickly and fully recover from cyber attacks.