Types of computer crimes

Types of cyber crime

Methods used by Computer Criminals

The persons who commit computer crimes are known as computer criminals or cyber criminals. The methods which are used by these criminals are the following.
Bomb
 It is a program that triggers under certain conditions. It is usually activated at a certain date. It may be planted in commercial software like shareware software.

Data Diddling

It is a process of changing data before or as it enters the system. The auditors must verify the accuracy of the source data and the processing that occurs. This is one of the easiest ways of committing a computer-related crime, because even a computer beginner can do it. Despite this being a simple task, it can have damaging effects. For example, a person responsible for accounting may change data about themselves or a friend or relative showing that they’re paid in full.

Denial of service

It shows down a computer system or network. It floods a computer or network with requests for information or data. The server under attack receives so many requests that it cannot respond to legitimate users.
Piggybacking
It is a process of entering the system by riding on the back of an authorized user. It occurs when an authorized user does not log off the system properly. An illegal user may continue where the original user left.
Salami Technique
It is a process of getting a small amount of money illegally from a large financial system.
Scavenging
It is a process of searching the company’s trash cans to find useful information. The thieves search garbage and recycling bins of individuals to find bank account numbers and credit card numbers etc.
Trap Door
It is an illegitimate program that is left within a completed legitimate program. It allows subsequent entry by unauthorized users to change the program.
Trojan horse
It is a program that hides itself within a useful program. It executes illegal, destructive instructions in the middle of a program such as a computer game.  Format C is an example of a Trojan horas.

Zapping 

The zapping software is designed to bypass all security systems.


Comments