Friday, June 13, 2008

THE POWER OF CYBER CRIME

The hydra-headed activities of cyber crime over the years as been of a great concern not only to the security agencies but of a real interest too to individuals as well, whom have serious concerns about the security and safety of browsing online since the inception of the Internet Technology over the pass twenty decays. There is no doubt that the Internet has come to stay as businesses could now be run online as the same ways some other businesses are run offline too.

While we enjoy this technological advancement, it has equally been use in some positive and negative ways. Therefore we have to consider our online safety and securities and not be ignorant about the possibility of being a victim of cyber crimes. To some of you who do not know or think that cyber crime does not exist it’s high time you reconsider your position on this. Cyber crime can be categories into these areas:

1. DATA FRAUD: this is the alteration of data already entertered on computer this also requires technical skills to perform. They are very common in developed economy.

2. OUT PUT FRAUD: This is the fraudulent use of data by suppression. This is less common than input or data fraud but very difficult to obtain evidence for prosecution.

3. SOFTWARE FRAUD: This is the altering or creating of new software programmes for fraudulent purposes. This is the "Father" of all computer fraud. It requires great technical expertise and harder to detect, and this is mostly committed by computer professionals.

4. HARKING OR CRAKER: This is deliberately gaining unauthorized access to an information system. It can also be describe as the accessing of a computer system without the express or implied permission of the owner of the computer system. A person who engages in this activity is known as a "system hacker" and may be motivated by the mere thrill of being able to outwit the security system in a computer. He may gain access remotely, using a computer in his own home or office connected to a compter network.
The hacker at times, does it or leaves a message publicizing his feat. Many of them are motivated by a sense of achievement: the very act of breaking into a computer system using their own mental effort is reward enough for them. There is a danger, however, that such "innocent" hackers can inadvertently cause danger to computer hacking. There is a more sinister side to computer hacking.

5. GULLIBILY SCAM OR PYRAMID SCHEMES: Despite that many of these schemes have been around for many years, the internet is still an avenue for the cyber criminals to reach millions of innocent victims who are tempted by the prospect of easy and fast money. The scammer uses the get-rich-quick plans that focus on the recruitment of new members. The formular usually requires the person to make a smale upfront payment, after which it is claimed they can make millions of the currency. They device nmore ingenuous ways to defrand people who are gullible and want to get rich quick.

7.CYBER HARASSMENT OR CYBER STALKERS: In developed world, internet harassment includes directing obscenities toward others and making derogatory comments based on gender, race, religion, Nationality or sexual orientation this type of cyber crime takes place often in chat rooms, through newsgroups and even through the sending of hate e-mails to targeted mailing lists. Unsolicited e-mail messages and advertisements can also be considered to be forms of cyber harassment when the content is offensive or of an explicit sexual nature. This is punishable in other countries with a six-month imprisonment.

8. CHILD PONOGRPHY OR OBSCENE CONTENTS: This is a sexual abuse of children; it is an offence for a person to have any indecent photograph of a child in his possession. A Child in the United Kingdom is defined as anybody or person under the age of sixteen.

9. COPYRIGHT CRIME OR INTELLECTUAL PROPERTY OFFENCES: This is the collective name given to legal rights, which protects the product of the human intellect. Basically, these rights are designed to provide remedies against those who steal the fruits of another person’s idea. For example, if a person writes a computer programme, he will be able to take legal action to obtain an injunction in the court of law or damages against anyone who copies or modifies the computer programme without the author’s permission.

10. CYBERSMERING: Is the use of the internet as a medium to defame or criticize an organization or an individual, often by ex-employees. The quick reach and accessibility of the internet makes it a very powerful tool in this respect.

No comments: