CLASSIFICATION OF CYBER CRIME
Computer crime is known by lots of different names, including cyber crime, e-crime etc. All of these are crimes where computers or networks are used or attacked. These electronic crimes are being used to steal identities and huge sums of money . Many traditional crimes such as theft, blackmail, forgery, emblezzlement and froad, today all conducted on internet.
As cybercrime continues to take up a disturbing publicity in the trends that mark our century, the commitment of governments, businesses and the global community to fight this pandemic is not surprising. However, combating this ill will entail identifying, defining and classifying cybercrime. Meanwhile the cybercrime phenomenon is now well known and defined; its classification has been limited at the top-level to a dichotomy of “computer-assisted” and “computer-focused” cybercrimes. This paper examines the crime theory and makes use of two primary motivation models plus four others to posit a motivational framework for cybercrime classification. The proposed model exposes a more holistic perspective on the topic, and would prove a useful tool for all the stakeholders in the battle against cybercrime.
There are some types of cyber crime :-
- Email spoofing
- Spamming
- Cyber defamation
- Forgery
- Hacking
- Online Fraud
- Pronographic Offenses
- Sofware Piracy
- Email Bombing
- Computer Network Intrusions
- Password Sniffing
- Identity Theft
- Password Cracking
- Key Loggers
UK Audit Commission (1998) Classification
• Fraud
• Theft
• Use of unlicensed software
• Private work
• Misuse of personal data
• Hacking
• Sabotage.
• Introducing pornographic material.
• Virus.
FBI’s National Crime Squad (Fraser, 1996)
• Intrusions of the Public Switched Network (the telephone company)
• Major computer network intrusions
• Network Integrity violations
• Industrial espionage
• Pirated computer software
• Other crimes where the computer is a major factor in committing the criminal offense
Computer Security Institute (CSI) (CSI, 2001)
• Theft and proprietary information
• Sabotage of data or networks
• Telecom eavesdropping
• System penetration by outsider
• Insider abuse of net access
• Financial fraud
• Denial of Service
• Spoofing
• Virus • Unauthorized insider access
• Telecom fraud
• Active wiretapping
• Laptop theft
No comments:
Post a Comment