Today I am back with my new topic which is based on Impacts of Internet on society
Let's start!!
The most important thing which Internet has done is that it has brought people of the world very class to each other. The communication has become so good that whereas it used to take 15 days for a letter to come from the USA, it now takes 15 seconds to send an e-mail to anywhere in the world. This has done a very significant difference to the approach of people towards computers too. Whereas it as though to be a learning tool only, now it has become a necessary tool for each home.
CRIME ON/THROUGH THE INTERNET
Most of the crimes on the Internet are related to breaking codes of various information available on the net. One can crack the password of somebody's credit card and encash money. The other is of spreading the virus. Even spreading of wrong and inflammatory information too.
WHAT IS CYBERCRIME?
When the Internet was developed, the founding fathers of Internet hardly had any inclination that Internet could also be misused for criminal activities. Today, there are many distributing things happening in cyberspace. Cybercrime refers to all the activities done with criminal intent in cyberspace. These could be either the criminal activity in the conventional sense or could be activities, newly evolved with the growth of the new medium. Because of the anonymous nature of the Internet, it is possible to engage in a variety of criminal activities with impunity an people with intelligence, have been grossly misusing the aspect of the Internet to perpetuate criminal activities in cyberspace. The filed of cybercrime is just emerging and new forms of criminal activities in cyberspace are coming to the forefront with the passing of each new day.
Cybercrime is defined as a crime in which the computer or the Internet is used to harm a user. Cybercrimes can be classified as:
- Hacking: A computer programmer who uses his skills to intentionally access a computer without authorization is known as hacking. The person is called a hacker. He doesn't have the intention of causing damage.
- Cracking: When there is intentional hacking i.e. when the person who gains unauthorized access causes damage, the person is called a cracker.
- Plagiarism: Any person who distributes any electronic book or document without the consent of the concerned person.
- Software Piracy: Unauthorized copying of software.
- Forgery: Counterfeit currency notes, postage and revenue stamps, mark sheets can be forged using sophisticated computers, printers, and scanners.
- Cyber Stalking: Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group or an organization.
- Email crimes:→
- Spoofing refers to email that appears to have been originated from one source when it was actually sent from another source.
- Spamming refers to sending email to thousands of users. It is a chain letter.
- Sending malicious code: Emails are used to send viruses. Trojan either as attachments or sending a link to a website which on the visiting downloads malicious code.
- Bombing is abusers repeatedly sending an identical email message to a particular address.
8. Banking/credit card related crimes:
- Use of stolen card information.
- Salami-deduce small amount of money from all customer accounts and adding it to own account.
Malware
Malware is used in short form for malicious software. It is a software that can be used to compromise computer function, steal data, bypass access controls, or otherwise cause harm to the host computer. Malware is a broad term that refers to a variety of malicious programmes. The most common types of malware are adware, bots, bugs, spyware, trojan horses, viruses, and worms.
- Adware
Adware (short for advertising-supported software) is a type of malware that automatically delivers advertisements. Common examples of adware include pop-up ads on websites and advertisements that are displayed by a software. Often times software and application offer "free" versions that come bundled with adware. Most adware is sponsored or authorized by advertisers and serves as a revenue-generating tool.
2. Bot
Bots are software programs created to automatically perform specific operations. While some bots are created for a relatively harmless purpose (video gaming, Internet auctions, online contests, etc), it is becoming increasingly common to see bots being used maliciously. Bots can be used in botnets ( collections of the computer to be controlled by third parties ) for DDoS attacks, as spambots that render advertisements on the websites, as web spiders that scrape server data, and for distributing malware disguised as popular search items on downloads sites.
3. Bug
In the context of software, a bug is a flaw produces an undesired outcome. These flaws are usually the result of human error and typically exist in the source code or compilers of a program. Minor bugs only slightly affect a program's behavior and as a result, can go for long periods of time before being discovered. More significant bugs can cause crashing or freezing. Security bugs are the most severe type of bugs and can allow attackers to bypass user authentication, override access privileges, or steal data. Bugs can be prevented with developer education, quality control, and code analysis tools.
4. Spyware
Spyware is a type of malware that functions by spying on user activity without their knowledge. These spying capabilities can include activity monitoring, collecting keystrokes, data harvesting (account information, logins, financial data ), and more. Spyware often has additional capabilities as well, ranging from modifying security settings of software or browsers to interfering with network connections. Spyware spreads by exploiting software vulnerabilities, bundling itself with legitimate software, or in Trojans.
5. Trojan Horse
A Trojan Horse is known as a "Trojan" is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware. A Trojan can give a malicious party remote access to an infected computer. Once an attacker has access to an infected computer, it is possible for the attacker to steal data (logins, financial data, even electronic money), install more malware, modify files, monitor user activity (screen watching, keylogging, etc), use the computer in botnets, and anonymize Internet activity by the attacker.
6. Virus
A Virus is a form of malware that is capable of copying itself and spreading to other computers. Viruses often spread to other computers by attaching themselves to various programs and executing code when a user launches one of those infected programs. Viruses can also spread through the script files, document, and cross-site scripting vulnerabilities in web apps. Viruses can be used to steal information, harm host computers and networks, create botnets, steal money, render advertisement, and more.
THANKS, FRIENDS TO READ THIS POST
NEW TIPS FOR TECH
Comments
Post a Comment