Links Patrocinados

Buscar por Título
   A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Cyber Crime


Cyber crime is an act that is punishable by the Information technology Act. A simple definition of cyber crime would be ?unlawful acts wherein the computer is either a target or tool or both.?

Cyber Crime Dimension:
Financial crime would include cheating, credit card fraud, money laundering etc.
Cyber Pornography includes pornographic websites, pornographic magazine produced using computer, pornographic photos etc.
Email spoofing is one that appears to originate from one source but actually has been sent from another source.
Forgery counterfeit currency notes, postage and revenue stamps, mark sheets etc.
Online gambling sites are fronts for money laundering.
Sale of illegal articles include sale of narcotics, weapons and wildlife etc. by posting information on web sites.
Intellectual Property Crime includes software piracy, copy right infringement, theft of computer sources code etc.
Cyber defamation occurs when defamation takes place with the help of computer.
Unauthorized Access to Computer System or Network.
Data Diddling is an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed.
Virus Attack are programs that attach themselves to a computer or a file and circulate themselves to other files or to a other computer on the network .They affect the data on a computer by altering the data or deleting it.
Logic bombs are event dependent programs.
Web Jacking occurs when some one forcefully take control of the web site.
Unauthorized access would mean any kind of access without the permission of rightful owner or a person in charge of the computer, computer system or computer network.
Packet sniffing is a technology used by crackers and forensics experts alike.
Tempest attack is the ability to monitor electromagnetic emission from computer in order to reconstruct the data. This allowed remote monitoring of network cables or remotely viewing monitors.

It is programs that can infect other programs by modifying them in such a way as to include a copy of it.
Stealth virus is one that hides the modifications it has made in the file or boot record by monitoring the system function used by program to read file from storage media and forging the results of such system function so that programs which try to read these area see the original uninfected form of the file instead of the actual infected form.
Polymorphic virus is one that produces varied copies of itself, in the hope that virus scanner will not be able to detect all instances of the virus.
Fast and slow infectors are a typical file infector copies itself to memory when a program infected by it is executed and then infect other programs when they are executed.
Companion virus is one that, instead of modifying an existing file creates a new program, which gets executed by the command line interpreter instead of intended program.
A macro virus is one that propagates through one type program, usually either Microsoft word or Microsoft excel. These types of programs contain auto open macros which automatically run when you open a document or spread sheet.

Resumos Relacionados

- System Software

- System Software

- Computer System Architecture

- Understanding Computer Viruses

- Understanding Computer Viruses

Passei.com.br | Biografias