Known Types of Computer Crimes by the UN fraud by computer manipulation: Handling input Also known as data theft, computer crime is more common because it is easy to make and difficult discovered. This offense does not require computer skills and can perform any person who has access to the normal functions of data processing at the stage of their acquisition. Manipulation of programs is very difficult to detect and often goes unnoticed because the offender must have specific computer skills. This offense is to modify existing programs in the computer system or add new programs or new routines. A common method used by people with expertise in computer programming is the so-called Trojan Horse, which involves inserting instructions computer covertly in a computer program that can perform an unauthorized function while its normal function. Handling output. is performed by setting a target computer system functions. The most common example is the fraud that is subject to ATMs by falsifying computer instructions for the data acquisition phase. Traditionally these frauds were made from stolen credit cards, however, now widely used computer equipment and specialized software to encode falsified electronic information in the magnetic strips on cards banking and credit cards. Fraud conducted by computer manipulation. Take automatic repetition of the processes of computation. Is a specialized technique called "salami technique" in which "thin slices" barely perceptible financial transactions are being pulled repeatedly from one account and transferred to another. Counterfeit Computer As Object When you alter data in the documents stored in computerized form. As instruments Computers can also be used to make counterfeit documents to stop commercial use. When photocopiers became available computerized color lasers based on a new generation of counterfeiting and fraudulent alteration. These copiers can make high resolution copies can edit documents and can even create false documents without resorting to an original, and the documents they produce are of such quality that only an expert can differentiate genuine documents. damage or modifications of programs or computer data sabotage computer is the act of clear, delete or modify unauthorized computer functions or data with intent to impede the normal operation of the system. Techniques for making computer sabotage are
- Virus is a series of key program that can be attached to legitimate programs and spread to other software. A virus can enter a system through a legitimate piece of software that has been infected, as well as using the Trojan horse method. Worms
- is made analogous to the virus in order to infiltrate legitimate programs or data processing to modify or destroy data, but is different from the virus because it can not regenerate. In medical terms we could say that a worm is a benign tumor while the virus is a malignant tumor. However, the consequences of an attack by a worm can be as severe as those of a virus attack: for example, a worm program that subsequently can destroy a computer system instructs a bank to stop transferring money to an account continuously illegal.
- logical or chronological pump requires expertise and programming that requires the destruction or alteration of data in a point in the future. However, unlike viruses or worms, logic bombs are difficult to detect before they explode, hence, of all computing devices criminals logic bombs are those with the greatest potential for harm. Detonation can be programmed to cause maximum damage and to take place long after the offender has left. The logic bomb can also be used as an instrument of extortion and can ask for a ransom in exchange for raising awareness of the place where the bomb is.
- Unauthorized access to systems or services For various reasons, from simple curiosity, as in the case of many hackers (Hacker) to sabotage or espionage.
- hackers The access is often from a exterior, located in the telecommunications network, using one of several means mentioned below. The offender may take advantage of lax security measures for access to or can identify gaps in existing security measures or system procedures. Often, hackers posing as legitimate users of the system, it is often the case in systems in which users can employ common passwords or passwords that are keeping the system itself.
- Unauthorized Duplication of Legal protection software. This may involve a financial loss material to the rightful owners. Some jurisdictions have criminalized this type of activity and are subject to criminal penalties. The problem has reached international proportions with the traffic of such unauthorized reproductions by modern telecommunications networks. In this regard, we believe that the unauthorized reproduction of software is a computer crime because the legal right to protect the intellectual property.
Source: http://www.delitosinformaticos.com/delitos/delitosinformaticos2.shtml
- Phishing: The cyber criminal gets to trick the user by mail, normally "spam" and ask him to make a bank transaction servers apparently have the same appearance.
- Spam : sending mass electronic communications.
-Scam: Shown as a hybrid between phishing and the pyramids of value. The initial technique through which to start or play, and that is also considered fraud or crime, is called "hoax."
- Hoax: These hoaxes and invented stories, which are nothing more than that, lies in overlapping narratives whose ultimate goal is to uncover the interest of the reader or recipient. These communications can have as its ultimate goal: Get money or spread a virus.
- threats.
- crimes of exhibitionism and sexual provocation.
- Offences relating to prostitution and corruption of minors.
- Crimes against privacy, the right to self-image and the inviolability of the home: The discovery and disclosure of secrets, eg interception of mail would treated as a violation of correspondence, provided there is no agreement and no intention of revealing secrets or violate the privacy of a third party. It would be a crime against the encroachment of privacy and data transfer reserved personal. Crimes
- honor: Slander and libel, having special mention when they are effected by advertising-spread.
- scams.
- The frauds of electricity. Expressly includes the telecommunications fraud as long as they use a mechanism for carrying it out, or maliciously altering the information or using clandestine means.
- damage. Highlights of the expansion of the existing definition above, including a special section for non-pecuniary damage "The same penalty shall be imposed on it by any means to destroy, alter, or disable any otherwise damage data, programs or documents contained in outside networks, media or computer systems. "
- crimes relating to intellectual property
- Offences relating to industrial property
- Offences relating to the market and consumers. Here you find including misleading advertising is published or disseminated on the Internet, provided notebooks make false allegations or uncertain about the characteristics manifest themselves, so that they can cause serious damage and visible to consumers.
Source: http://www.microsoft.com/spain/empresas/legal/pharming.mspx
Phishing involves the theft of banking data through the Internet. The most common method is the use of email to contact and persuade users to visit sites that mimic those of the spoofed institution and which also must enter personal data (account number, PIN, ETC.) that are well recorded. It is common after the introduction of data showing an error page, to think that the victim failed to make the connection and so does not suspect anything. Another technique to steal bank details is the introduction to the computer to spy a copy of Trojan-like malware with keylogger capabilities (or program that records keystrokes on a computer). In practice, when the Trojan detects that the user is visiting the URL of a bank, the keylogger is active and contains all user keystrokes, which will usually include logins, passwords, account numbers and other bank details. Besides these methods, recently reported a new method, more sophisticated and for the same purpose, called pharming. In this case, the attack is made at the user's computer or Internet service provider, so that when the user requests, as it normally does, a page of your bank, you will be redirected to another website that mimics the page original. Source: Http://www.laflecha.net/canales/seguridad/200511021/
0 comments:
Post a Comment