blog




  • Essay / The problem of cybercrime

    Table of contentsWhat is cybercrimeWho is a hackerWho is a crackerReasons for cybercrimeProtection against cybercrimeConclusionCybercrime is defined as crimes committed on the Internet using the computer as a tool or as victim targeted by a hacker or cracker. as we are growing up on rapid data manipulation system in this technological era, unfortunately some skilled professionals are using this ability inappropriately by harming the society, finding vulnerabilities in company systems and fixing them, creating and distributing code containing viruses. . Here, the term “cybercrime” is a misnomer. Fundamentally, the concept of cybercrime is not radically different from the concept of conventional crime. In recent years, privacy and ethical behavior have played an important role in our lives. This is particularly important in security-related areas. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get Original Essay What is Cybercrime Cybercrime is the recent and perhaps the most well-known problem in the cyber world. “Cybercrime can be considered as the species whose genre is the common crime, and in which the computer is the object of criminal behavior. » “Any criminal activity that uses a computer as an instrument, target or tool. the means of perpetuating new crimes fall within the framework of cybercrime.” A definition of cybercrime can be "illegal acts in which the computer is either a tool or a target, or both." The computer can be used as a tool in the following financial crimes, sale of illegal items, pornography, crimes against intellectual property, electronic mail. identity theft, cyberharassment, counterfeiting, cyberdefamation. The computer may, however, be the target of illegal acts in the following cases: illicit access to the computer system/computer networks, theft of information contained in the electronic form, therefore e-mail bombardment, manipulation of data. , salami attacks, logic bombs, Trojan attacks, Internet time thefts, web jacking, computer system theft, physically damaging the computer system. Who is Hacker? There are hundreds of definitions of “hacker” on the web. Combining all of this, we get a computer enthusiast, who enjoys learning programming languages ​​and/or computer systems and can often be considered a subject matter expert. So he was well versed in the art and science of making computers and software do much more than the original designers intended. “Hackers are computer experts. Hackers built the Internet. So hackers made the Unix operating system what it is today. Hackers therefore use Usenet. Hackers make the World Wide Web work. So if you're part of that culture, if you've contributed to it, and other people know who you are and call you a hacker, you're a hacker. Real hackers view crackers as lazy, irresponsible, and unintelligent and want nothing to do with them. Unfortunately, many journalists and writers have been misled into using the word "hacker" to describe "crackers", which obviously bothers real hackers. Who is a cracker? A person who breaks into other people's computer systems to get away with it or who intends to get away with it. to cause harm isa “cracker”. A hacker is a very talented programmer, respected by his peers. On the other hand, a real hacker can find many useful projects to work on. Breaking things is definitely a characteristic of children of all ages. Definitely The basic difference is this: hackers build things; crackers break them.Reasons of cybercrimeNow, “the concept of law” says that “human beings are vulnerable and therefore the rule of law is necessary to protect them”. So, applying this to cyberspace, we can say that computers are vulnerable and therefore the rule of law is necessary to protect them and protect them from cybercrime. The reasons for the vulnerability of computers can be considered to be: Ability to store data in a relatively small space: The computer has the unique characteristic of storing data in a very small space. This makes it possible to delete or extract information via physical or virtual media greatly facilitates the task. Easy to Access: The problem faced in protecting a computer system from unauthorized access is that there is every possibility of a breach, not due to human error, but due to the complex technology . By a secretly implanted logic bomb, keyloggers capable of stealing access codes, advanced voice recorders; Retinal imagers, etc., which can fool biometric systems and bypass firewalls, can be used to bypass many security systems. Complex: in the Computers run on operating systems and these operating systems are in turn composed of millions of codes. The human mind is fallible and it is not possible for it not to malfunction at any point. Cybercriminals take advantage of these loopholes and penetrate the computer system. Negligence: Negligence is therefore very closely linked to human behavior. It is therefore very likely that when protecting the computer system, there may be negligence, which allows a cybercriminal to access and control the computer system. Loss of Evidence: Loss of evidence is a very common and obvious problem because all data is systematically destroyed. The subsequent collection of data outside the territorial scope also paralyzes this criminal investigation system. the mail servers there, which ultimately results in a crash. Data trafficking: This type of attack involves modifying raw data just before a computer processes it, and then modifying it after processing is complete. The Electricity Commission faced a similar problem of data manipulation when the department was in the process of being computerized. Salami attacks: This type of crime is usually prevalent in financial institutions or with the aim of committing financial crimes. An important feature of this type of infringement is that the alteration is so minimal that it would normally go unnoticed. For example, the Ziegler case in which a logic bomb was introduced into the banking system, which deducted 10 cents from each account and deposited it into a particular account. Denial of service attack: the victim's computer is flooded with more requests than it can handle, causing it to crash. Distributed denial of service (DDoss) attack is also a type of denial of service attack, in which the perpetrators are numerous and widespread. Trojan Horse Attacks: Obviously, this term has its origins in the word “Trojan horse”. In software, this means an unauthorized program, which passively takes control of the system.