Computer Related Crimes

Embed Size (px)

Citation preview

  • 8/15/2019 Computer Related Crimes

    1/4

    Phishing

    The act of sending an e-mail to a user falsely claiming to be an established legitimateenterprise in an attempt to scam the user into surrendering private information that will beused for identity theft. The e-mail directs the user to visit a Web site where they are askedto update personal information, such as passwords and credit card, social security, and

    bank account numbers, that the legitimate organization already has. The Web site,

    however, is bogus and set up only to steal the uses information.

    Pharming

    Pharming is an attacker 's attack intended to redirect a website 's traffic to another, bogussite. Pharming can be conducted either by changing the hosts file on a victim's computeror by e ploitation of a vulnerability in !"# server software. !"# servers are computersresponsible for resolving $nternet names into their real $P addresses . %ompromised !"#servers are sometimes referred to as &poisoned&. Pharming re uires unprotected access totarget a computer, such as altering a customer's home computer, rather than a corporate

    business server.

    Trojan

    ( Tro)an horse, or Tro)an, is a non-self-replicating type of malware which appears to perform a desirable function but instead facilitates unauthorized access to the user'scomputer system. Tro)ans do not attempt to in)ect themselves into other files like acomputer virus . Tro)an horses may steal information, or harm their host computersystems. *+ Tro)ans may use drive-by downloads or install via online games or internet-driven applications in order to reach target computers. The term is derived from the

    Tro)an orse story in reek mythology because Tro)an horses employ a form of / socialengineering ,0 presenting themselves as harmless, useful gifts, in order to persuadevictims to install them on their computers

    shoulder surfing

    #houlder surfing refers to a direct observation, such as looking over a person's shoulder,to obtain information. $n some cases shoulder surfing is done for no reason other than toget an answer, but in other instances it may constitute a security breach as the the person

    behind may be gleaning private information such as your P$" at a bank machine, or

    %redit card information as you enter it into a Web based shopping cart check-out.

    Skimming

    #kimming is a method of rapidly moving the eyes over te t with the purpose of gettingonly the main ideas and a general overview of the content.#kimming is useful in threedifferent situations.

    Pre-reading

    1eviewing

    http://www.webopedia.com/TERM/E/e_mail.htmlhttp://www.webopedia.com/TERM/W/Web_site.htmlhttp://www.webopedia.com/TERM/W/Web_site.htmlhttp://en.wikipedia.org/wiki/Attackerhttp://en.wikipedia.org/wiki/Attackerhttp://en.wikipedia.org/wiki/Websitehttp://en.wikipedia.org/wiki/Websitehttp://en.wikipedia.org/wiki/Hosts_filehttp://en.wikipedia.org/wiki/Hosts_filehttp://en.wikipedia.org/wiki/Exploit_(computer_security)http://en.wikipedia.org/wiki/Vulnerability_(computing)http://en.wikipedia.org/wiki/Vulnerability_(computing)http://en.wikipedia.org/wiki/Domain_name_systemhttp://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/DNS_cache_poisoninghttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Trojan_horse_(computing)#cite_note-1http://en.wikipedia.org/wiki/Drive-by_downloadhttp://en.wikipedia.org/wiki/Social_engineering_(security)http://en.wikipedia.org/wiki/Social_engineering_(security)http://www.webopedia.com/TERM/S/surf.htmlhttp://www.webopedia.com/TERM/S/security.htmlhttp://www.webopedia.com/TERM/W/World_Wide_Web.htmlhttp://www.webopedia.com/TERM/S/shopping_cart.htmlhttp://www.webopedia.com/TERM/W/Web_site.htmlhttp://en.wikipedia.org/wiki/Attackerhttp://en.wikipedia.org/wiki/Websitehttp://en.wikipedia.org/wiki/Hosts_filehttp://en.wikipedia.org/wiki/Exploit_(computer_security)http://en.wikipedia.org/wiki/Vulnerability_(computing)http://en.wikipedia.org/wiki/Domain_name_systemhttp://en.wikipedia.org/wiki/IP_addresshttp://en.wikipedia.org/wiki/DNS_cache_poisoninghttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Trojan_horse_(computing)#cite_note-1http://en.wikipedia.org/wiki/Drive-by_downloadhttp://en.wikipedia.org/wiki/Social_engineering_(security)http://en.wikipedia.org/wiki/Social_engineering_(security)http://www.webopedia.com/TERM/S/surf.htmlhttp://www.webopedia.com/TERM/S/security.htmlhttp://www.webopedia.com/TERM/W/World_Wide_Web.htmlhttp://www.webopedia.com/TERM/S/shopping_cart.htmlhttp://www.webopedia.com/TERM/E/e_mail.html

  • 8/15/2019 Computer Related Crimes

    2/4

    1eading

    Application fraud

    (pplication fraud can be split into two categories. The first of these is where a criminalassumes another persons identity, solely for the purpose of receiving another individualscredit cards. The second form of application fraud is known as financial fraud. This iswhere an individual applies for a credit card, but gives false details about his or her self.

    Bill discounting fraud

    2ill discounting fraud refers to a type of fraud in which a fraudster presentshimself3herself as a genuine, profitable customer before a bank by using a company. (fter that the company will regularly and repeatedly use the bank to get payment from one ormore of its customers and thereby give the bank the picture of a desired customer. #incethe customers in uestion are part of the fraud these payments are always made. Theywill also actively pay any and all bills raised by the bank. 4ventually, when the bank ishappy with the company, the company will re uest the bank to settle its balance with thecompany before billing the customer. 4ven after this, the fraudulent company will carryon business along with its fraudulent customers and the unwitting bank. When theoutstanding balance between the bank and the company is sufficiently large, the companywill take away the payment from the bank. #ubse uently the company and its customerswill disappear leaving no-one to pay the bills issued by the bank

    Extortion

    4 tortion 5also called shakedown, outwresting, and e action6 is a criminal offence ofunlawfully obtaining money, property, or services from a person, entity, or institution,through coercion . 1efraining from doing harm is sometimes euphemistically called

    protection . 4 tortion is commonly practiced by organized crime groups . The actualobtainment of money or property is not re uired to commit the offense. 7aking a threat of violence which refers to a re uirement of a payment of money or property to haltfuture violence is sufficient to commit the offense. 4 action refers not only to e tortionor the unlawful demanding and obtaining of something through force, *+ but additionally,in its formal definition, means the infliction of something such as pain and suffering ormaking somebody endure something unpleasant

    Falsification of Loan Applications

    While scheming to defraud four banks and a credit union, one con opened checking andsavings accounts using a false name and a fraudulently obtained new social security

    number. e then applied for seven loans for the stated purpose of financing the purchaseof motor vehicles.

    Front running

    8ront running is the illegal practice of a stockbroker e ecuting orders on a security for itsown account while taking advantage of advance knowledge of pending orders from itscustomers. When orders previously submitted by its customers will predictably affect the

    http://en.wikipedia.org/wiki/Crimehttp://en.wikipedia.org/wiki/Unlawfulhttp://en.wikipedia.org/wiki/Coercionhttp://en.wikipedia.org/wiki/Euphemismhttp://en.wikipedia.org/wiki/Euphemismhttp://en.wikipedia.org/wiki/Protection_rackethttp://en.wikipedia.org/wiki/Organized_crimehttp://en.wikipedia.org/wiki/Groups_of_peoplehttp://en.wikipedia.org/wiki/Groups_of_peoplehttp://en.wikipedia.org/wiki/Threathttp://en.wikipedia.org/wiki/Violencehttp://en.wikipedia.org/wiki/Extortion#cite_note-1http://en.wikipedia.org/wiki/Pain_and_sufferinghttp://en.wikipedia.org/wiki/Stockbrokerhttp://en.wikipedia.org/wiki/Order_(exchange)http://en.wikipedia.org/wiki/Order_(exchange)http://en.wikipedia.org/wiki/Security_(finance)http://en.wikipedia.org/wiki/Crimehttp://en.wikipedia.org/wiki/Unlawfulhttp://en.wikipedia.org/wiki/Coercionhttp://en.wikipedia.org/wiki/Euphemismhttp://en.wikipedia.org/wiki/Protection_rackethttp://en.wikipedia.org/wiki/Organized_crimehttp://en.wikipedia.org/wiki/Groups_of_peoplehttp://en.wikipedia.org/wiki/Threathttp://en.wikipedia.org/wiki/Violencehttp://en.wikipedia.org/wiki/Extortion#cite_note-1http://en.wikipedia.org/wiki/Pain_and_sufferinghttp://en.wikipedia.org/wiki/Stockbrokerhttp://en.wikipedia.org/wiki/Order_(exchange)http://en.wikipedia.org/wiki/Security_(finance)

  • 8/15/2019 Computer Related Crimes

    3/4

    price of the security, purchasing first for its own account gives the broker an unfairadvantage, since it can e pect to close out its position at a profit based on the new pricelevel. The front running broker either buys for his own account 5before filling customer

    buy orders that drive up the price6, or sells 5where the broker sells for its own account, before filling customer sell orders that drive down the price6.

    Hacking as a Destructi e Tool

    The common stance on hacking with the average person is that it is morally wrong. Therehave been several instances where hacking has proven to have caused problems. ackingcan create a variety of damages to people, groups and systems of broad spectrum.

    "egative acking $nteractions9

    $dentity Theft

    4-mail (ccess

    Website #ecurity

    !heck Fraud%heck fraud accounts for yearly losses of at least :;+< million, more than twelve times

    the :=< million taken in bank robberies annually.

    "iting

    %heck kiting is when in-transit or non-e istent cash is recorded in more than one bank account. The crime usually occurs when a bank pays on an unfunded deposit.

    8or e ample, a bum check is deposited into an account. 2efore the cash is collected bythe bank, a check is written against the same account and deposited into a secondaccount, or cashed. The increased use of wire transfers allows this type of scheme to be

    perpetrated very uickly.

    Booster !hecks

    ( booster check is a non-sufficient fund 5"#86 check used to make a payment to a creditcard account. >ne group used &booster checks& to &bust out& legitimate credit cards. Theyused credit card &convenience checks& issued by the banks and credit card companies to

    inflate their credit card limits? or to &bust out& the credit card to double or triple theestablished line of credit.

    A scripting language

    ( scripting language or script language is a programming language that supports thewriting of scripts, programs written for a software environment that automate thee ecution of tasks which could alternatively be e ecuted one-by-one by a humanoperator. 4nvironments that can be automated through scripting include softwareapplications , web pages within a web browser , the shells of operating systems 5>#6, andseveral general purpose and domain-specific languages such as those for embedded

    systems .

    http://en.wikipedia.org/wiki/Programming_languagehttp://en.wikipedia.org/wiki/Software_environmenthttp://en.wikipedia.org/wiki/Automatehttp://en.wikipedia.org/wiki/Execution_(computing)http://en.wikipedia.org/wiki/Software_applicationhttp://en.wikipedia.org/wiki/Software_applicationhttp://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Shell_scripthttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/General-purpose_programming_languagehttp://en.wikipedia.org/wiki/Domain-specific_languagehttp://en.wikipedia.org/wiki/Embedded_systemhttp://en.wikipedia.org/wiki/Embedded_systemhttp://en.wikipedia.org/wiki/Programming_languagehttp://en.wikipedia.org/wiki/Software_environmenthttp://en.wikipedia.org/wiki/Automatehttp://en.wikipedia.org/wiki/Execution_(computing)http://en.wikipedia.org/wiki/Software_applicationhttp://en.wikipedia.org/wiki/Software_applicationhttp://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Web_browserhttp://en.wikipedia.org/wiki/Shell_scripthttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/General-purpose_programming_languagehttp://en.wikipedia.org/wiki/Domain-specific_languagehttp://en.wikipedia.org/wiki/Embedded_systemhttp://en.wikipedia.org/wiki/Embedded_system

  • 8/15/2019 Computer Related Crimes

    4/4

    !harge#ack

    Chargeback is the return of funds to a consumer, forcibly initiated by the issuing bank of the instrument used by a consumer to settle a debt. #pecifically, it is the reversal of a prior outbound transfer of funds from a consumer's bank account , line of credit , or credit card .

    %hargebacks also occur in the distribution industry. This type of chargeback occurs when

    the supplier sells a product at a higher price to the distributor than the price they have setwith the end user. The distributor then submits a chargeback to the supplier so they canrecover the money lost in the transaction.

    http://en.wikipedia.org/wiki/Issuing_bankhttp://en.wikipedia.org/wiki/Bank_accounthttp://en.wikipedia.org/wiki/Bank_accounthttp://en.wikipedia.org/wiki/Line_of_credithttp://en.wikipedia.org/wiki/Credit_cardhttp://en.wikipedia.org/wiki/Issuing_bankhttp://en.wikipedia.org/wiki/Bank_accounthttp://en.wikipedia.org/wiki/Line_of_credithttp://en.wikipedia.org/wiki/Credit_card