Three Aspects of Cybercrime

CyberPiracy

is any instance where the Internet is used to copy a digital document without authorization.

Examples :

*  copying and distributing music (MP3) or video without the copyright holder’s permission,

*  using cloned credit card information to steal from an online store,

*  copying software onto a CD without paying for it.

CyberTrespass

accessing a computer’s or network’s resources without authorization or permission from the owner, but does not alter, disturb, misuse, or damage the data or system. This is hacking for the purpose of entering an electronic network without permission.

Examples :

*  Using a wireless internet connection at a hotel at which you are staying and accessing the hotel’s private files without disturbing them because they are available.

*  Reading email, files, or noting which programs are installed on a third-party’s computer system without permission just for fun, because you can. This is sometimes simply called snooping.

CyberVandalism

Damaging or destroying data rather than stealing or misusing them (as with cybertheft) is called cybervandalism. This can include a situation where network services are disrupted or stopped. This deprives the computer/network owners and authorized users (website visitors, employees) of the network itself and the data or information contained on the network.

Examples:

*  Entering a network without permission and altering, destroying, or deleting data or files.

*  Deliberately entering malicious code (viruses, rootkits, trojans) into a computer network to monitor, follow, disrupt, stop, or perform any other action without the permission of the owner of the network.

*  Attacking the server of the computer network (DDoS attack) so the server does not perform properly or prevents legitimate website visitors from accessing the network resources with the proper permissions.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s