Cyber Crime and Instruction Detection System
Active In SP
Joined: Sep 2010
05-10-2010, 03:55 PM
intrusion detection system.docx (Size: 267.53 KB / Downloads: 162)
Recent and anticipated changes in technology arising from the convergence of communications and computing are truly breathtaking, and have already had a significant impact on many aspects of life. Banking, stock exchanges, air traffic control, telephones, electric power, health care, welfare and education are largely dependent of information technology and telecommunications for their operation. We are moving towards the point where it is possible to assert that everything depends on software.
The increased capacities of information systems today come at the cost of increased vulnerability. Information technology has begun to produce criminal opportunities of a variety that the brightest criminals of yore couldn't even begin to dream about.
Intrusion-detection systems collect information from a variety of vantage points within computer systems and networks and analyze this information for symptoms of security breaches. Intrusion-detection and vulnerability-assessment technologies allow organizations to protect themselves from losses associated with network security problems. Intrusion-detection is the logical complement to network firewalls, extending the security management capabilities of system administrators to include security audit, monitoring, attack recognition, and response.
Cyber crime or e-crime or high-tech crime generally refers to criminal activity where network is the target or place of crime. The term cyber crime is used to describe criminal activity in which the computer or network is the necessary part of the crime.
Cyber crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), and data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery(ID theft), electronic fraud.
The cyber criminals constitute of various groups/ category. This division may be justified on the basis of the object that they have in their mind. The following are the category of cyber criminals:-
-Children and adolescents between the age group of 6 – 18 years – The simple reason for this type of delinquent behavior pattern in children is seen mostly due to the inquisitiveness to know and explore the things. Other cognate reason may be to prove themselves to be outstanding amongst other children in their group. Further the reasons may be psychological even. E.g. the BAL Bharati (Delhi) case was the outcome of harassment of the delinquent by his friends.
-Organized hackers- These kinds of hackers are mostly organized together to fulfill certain objective. The reason may be to fulfill their political bias, fundamentalism, etc. The Pakistanis are said to be one of the best quality hackers in the world. They mainly target the Indian government sites with the purpose to fulfill their political objectives. Further the NASA as well as the Microsoft sites is always under attack by the hackers.
-Professional hackers / crackers – Their work is motivated by the color of money. These kinds of hackers are mostly employed to hack the site of the rivals and get credible, reliable and valuable information. Further they are unemployed to crack the system of the employer basically as a measure to make it safer by detecting the loopholes.
-Discontented employees- This group includes those people who have been either sacked by their employer or are dissatisfied with their employer. To avenge they normally hack the system of their employee.
Active In SP
Joined: Feb 2012
29-03-2012, 10:46 AM
to get information about the topic "cyber crime" full report ppt and related topic refer the link bellow