Advanced Computing Investigation Topic Cyber Crimes

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

The main and very dangerous crimes are doing throw the computers and committing to change and editing the information on computer. Cyber crime is mostly done with the computers and on the Internet. This crime also includes traditional crimes like (fraud, theft, black mail, forgery).

In this world computer usage is rapidly so computer crimes are also increasing and these crimes are creating more problems.

The computer crimes can be defined as criminal activity including information IT infrastructure, it’s include illegal access on network or unauthorised access, illegally connecting to the database and system interference and ID theft and Electronic Fraud.

Computer crimes are becoming high profile particularly some crimes like surrounding hacking, copy right infringement through wares and child brushing, child pornography. The cyber crimes also avoid the privacy when the theft important information.

Contents

Title page

1.Abstract………………………………………………………………………….1

Contents

Introduction…………………………………………………………………...….4

Risks and Ethical Issues………………………………………………………….5

Literature Review……………………………………………………………..….6

The computer Dependent Age………………………………….6

4.2. TYPES OF CYBER CRIMES……………………………………….6

4.2.1.Fraud by computer manipulation………………………. 6

4.2.2 Computer Forgery……………………………………..6

4.2.3 Damage to Data/Programs……………………………..6

4.2.4 VIRUS: (Vital information resources under seize)…7

4.2.5WORMS: (Write Once Read Many)……………………7

4.2.6 Unauthorized access……………………………………..7

4.2.7EMAIL SPOOFING………………………………………7

4.2.8 PHARMING……………………………………………..7

4.2.9 PROBLEMS………………………………………...7

4.2.10 PROTECTION………………………………………..8

Research Programme………………………………………………………..8

5.1Hackers Techniques………………………………………………8

5.1.1 Call-back Units…………………………………………8

5.1.2 The Decoy……………………………………………..9

5.2 Common Electronic Crimes………………………………………….10

5.2.1 Electronic Crime Detection……………………………….10

5.3 Computer Crime Scene Investigation through Cloud Computing………..…10

5.3.1 Trace Back Through the Cloud Computing………………………...…11

5.3.2 IP range of amazon elastic computes cloud………………………..…..11

Solutions………………………………………………………………12-13

How to avoid Getting Hacked………………………………12

Conclusion…………………………………………………………………....13-14

References……………………………………………………………...…15-16

1. INTRUDUCTION:

Now a days most of Industries and Banking sectors are used Internet system for fast applications of company. But some criminals are easily hacking that information and create the problems.

Many large industries and companies are sending their important files, company personal information and many dealings by using Internet only. But that information reached to another place without permission by these types of crimes.

Entire the world most of companies face this kind of problems so every company need self-protection by these kind of crimes and illegal activities. So our main goal is attempt to minimize the crimes as much as possible. And decrease the side effects by using information technology and develop the protection by using this technology and need decrease Complexity.

Companies and organizations are using these Internet for exchanging their information throws Internet and some 3rd party users are access the information with out permit ion, these problems are like hacking, cyber terrorism, and computer virus. SNS like face book, my space and twitter becoming one of the cyber crimes most dangerous places on the internet and cyber criminals sends spam to other users and stealing the personal information and post and attaching virus to computers. 2 millions users are using FB so more cyber criminals are done in the face book and it’s dangerous. And above listing sites are also facing the problems with criminals.

Security providing in Internet is most challenge because so many organizations activities are working throw the Internet. There is so many applications are introduced to reduce the crimes the main goal is the reduce the Internet or cyber crimes. Entire world most of the organizations are facing this kind of cyber crime problems and they need to self-protection by these kind of cyber crimes. The cyber crime is the major problem facing all over the world start to implement low and other mechanisms to reduce the cybercrimes.

So, the main goal is to reduce the crimes on World Wide Web as much as possible. Detecting the side effects by using Information Technology and develop the protection by using IT need to prevent and decrease complexities on against crimes on Internet.

Key words: Cyber Crimes, Internet, Information technology, Companies and Industries, protection, cyber Terrorism.

3. Ethical Issues:

Maintain the rules of plagiarism.

This is the main danger, which in not underestimated mainly in High Tech Domain’s.

Confidentiality of data and Participants.

To recognize the area is a main mini field of complexity, according to law and local circumstances.

To observe weak points carefully to make or break our project.

Risks:

It is difficult to explain when the first crime involving a computer actually took place.

Lowers the suspect’s security:

Spread of "Trojan" development skills:

4. LITERATURE REVIEW:

4.1 The Computer Dependent Age:

Now-a-days world became totally dependent on mechanized organizations by using them in every part of their life from transfer control systems to health services. The society depends on computer system, therefore has profound human measurements too.

The rapid expansion of large-scale computer networks and the ability to access systems through regular telephone lines increase the vulnerability to these systems.

4.2. TYPES OF CYBER CRIMES:

4.2.1 Fraud by computer manipulation:

Time changing in pc also a important and main of Computer Manipulation and although this has been tackled. 

Main frauds occur by the software only. At the time of using trial period only we can easily date and time of your pc. These all are accord by using software’s continually.

Biggest form of Manipulation is hacking or virus, which can look like a system file which you want, but do something else entirely different like open up a another way to your computer.

Software’s only used to find and create the crimes. This software’s only give a chance to create the crimes.

Fraud by Input Manipulation:

Its accurse where false or generating and misleading wrong amounts are enter in to accounts in banking sectors and wrong amounts enter in to stores like enter the extra amounts.

Fraud by Output Manipulation:

Its occurs where data or software is input into a computer in order to affect what the computer outputs: for example, stolen the bank ATM numbers and addresses.

4.2.2 Computer Forgery:

Computer forgery is mainly occurs whenever a computer is used to create a new false documents or false certificates or illegal news’s and fraudulent document. The widespread of computer networks are used communicate the peoples easily and used to create the new information and shared the new information to peoples easily.

4.2.3 Damage to Data/Programs:

It is a major fraud activity it involves directly or indirectly. like introduce the new programs which is known as virus files. Due to this virus files only important data is damaged and some programs also miss matched. By the Internet also most of common source of the damage of data. This is a major source of criminal activities. And is commonly referred to as computer storage.

4.2.4 VIRUS: (Vital information resources under seize)

Virus is a main source to delete the programmed and important files. These all viruses also created by humans only. These all viruses’ files are look like attracting the persons only. If we are opened that files definitely we are loss the data in our computers. And it is a source to delete the files and the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.

4.2.5WORMS: (Write Once Read Many).

It is also a type of virus and this worms easily expand from one computer to another computer easily.it is capable to expand without human requirement or human action. Due to this worms only systems damaged easily.

LOGIC BOMB: This is a type of programmed which is used to change the information. And this is the one of the future of programming.

4.2.6 Unauthorized access:

It is used to helping to keep the data and software’s in secure. And also it is used to running the operating system perfectly and securely and it is used to secure the all type of information and massages in pc.

4.2.7 EMAIL SPOOFING

This is the duplication of the emailing this is look like same older one but it is not a older one. That means both mails are look like it but both are different ones. That means having it kind of characters and performances but both is different. These kind of email spoofing’s are used when fraud persons are send an emails pretending to be from users personal accounts or most important deportment of a well-trusted company or industry. Its modified version of old emails but look like it.

4.2.8 PHARMING

It is a process of one website going to another website without the third person involvement .it means it is a bogus web site user was trying to visit and it is did by user with out knowledge or with out willingness of the user. The main purpose of to doing it is to trick the user into giving his own information which is match in to the database of the duplicate website and used illegally. Hackers carry out Pharming either by changing the original file on the users computer or by using a weakness in Internet server software responsible for changing different names into real addresses.

4.2.9 PROBLEMS

Problems like spoofing are creating problems in human’s personal life and even out of his security. There are most of the persons out there who take every opportunity to prey on users utilizing all means available to them from telephones to computers big and small all in order to make easy money. And more problems accruing in transform the money one account to another account through the online and transform the data for the business purposes also transform from one computer to another computer is also a challenging in this days be Couse of its also hacking without the permission of owners.

4.2.10 PROTECTION

Now a day’s protection is a challenging thing of users. And it’s required everywhere. Even protecting the personal information also challenging thing for users. But there is a chance to protect the personal and information. It is possible by using our common scenes only I’s need to use different symbols for passwords and proper logout is also required for protect the personal data. Another way to protect one from hacking is also using anti-virus software because most of them can detect

Hacking. And need to change your personal accounts password regularly as advised by banks and to report any occurrences of phishing and need to use different characterizing’s and don’t use the names and mobile numbers and nick names and pet names or family numbers names. Be Couse these are the main sources for hacking the personal accounts. By fallowing these instructions only having a chance to protect the personal accounts.

5.RESARCH PROGRAMME:

5.1Hackers Techniques:

5.1.1 Call-back Units:

Call back units are very good security devices, but most mobile phone systems call back unit is easy to access the hackers.

The call back units use the same line for incoming calls and outgoing calls. He calls this call back unit and any type of personal ID code. The hacker takes the phone line after he enters the authorised ID.

Now hacker is waiting for call back to meet it.

It is very simple for hacker to find the ID code what the user entered. Because the ID is not taking any precautions for security.it is only take the security for reach the Incoming calls.

Some call back ID have codes like location identification numbers. Same location is used by more people.so, the ids are easily identified. Some call back units are always defaulting. Once the hacker entered the code he will allows or gives the permeation to calling the current number.

5.1.2 The Decoy:

This technique is the one of the most dangerous hacking tool.it is coming in three different types of versions. Coming to the first version, the hacker creates a low security account then changing that account to higher security account. First the hacker using his lower security account and write a program for that account and that will emulate the log on procedures of the computers.

Now allow the user to enter their name and password. For access the hacker save the information like name and password.

Use the account information and tell the entries are no acceptance.

Turn terminal control and back over the system

Now the user enters the name and password that displays re- enter the user assume that the password mistyped .so, he will try again this time with more success.

The below diagram step-by-step process of Decoy.

__________________

| Clear Terminal |

| Screen |

|____________________|

||

_________||_________

| Print CompuServe |

| Computer |

|_____ Network ______|

||

_________||_________

| Print "ENTER |

| PASSWORD" |______

|____________________| |

|| |

_________||_________ |

| PASSWORD ENTERED? |__NO__|

|____________________|

||_YES

_________||_________

| SAVE PASSWORD |

| INFORMATION |

|____________________|

||

_________||_________

| PRINT "LOGIN |

| INCORRECT |

|____________________|

||

_________||_________

| LOG OFF/RETURN |

| CONTROL TO |

| OPERATING SYSTEM |

|____________________|

Figure: Processing of Decoy

Source: http://www.elite-hackers.com/files/textfiles/techiq.txt

5.2 Common Electronic Crimes:

Electronic crime is an in most case it is a older crime it is not paper based it just electronic. The e-mail hacking is the one of the main electronic crime i.e. E-mail spoffing.it is also known as IP spoofing. A document is sets to be colleges, vendors and customers. The major problem is based on that information; the organization can makes impropriate decisions. These crimes are same as counter setting using copyright machine.

The e-mail hacking is relates misleading correspondence data binding involves false electronic data, electronic base input leads to false outputs. Password taking is an automated knowing from user name, user id or phone number. The hackers are taking the information and with the information they brake and enters into the system.

5.2.1 Electronic Crime Detection:

There are one or more types of intrusion detection techniques for electronic crimes.

The intrusion detection techniques include following.

Tripwires

Checking tools for Configuration

Honeypots

Operating system commands

Tripwires:

It is one of the software programmes. This software is used to defect critical file changes. Most of the hacker makes modifications when they install backdoor entry points and the hackers are the alter five systems.

5.3 Computer Crime Scene Investigation through Cloud Computing:

Cloud computing gives the opportunities for network tracing an Internet hacker or criminal in the network. We can use the new model i.e. "pay-as-you-go" for cloud computing and conduct many type of trace back in cybercrime scene investigation.

Cloud computing gives the users to use the different services and venues to do computing on the internet.it is like viewed as ready to go information technologies for install the services over the internet. And pay as you go is also available on demand for any time for rent. Users are not need to buy any type of hardware or software configures them locally. Through the cloud computing software and hardware purchased as a service.

5.3.1 Trace Back Through the Cloud Computing:

The below figure gives the idea of trace back though the cloud computing. The main purpose of this paper some are configuring for through entry another some are configure for through exit nodes. Flight bomb width and appropriate number of lookouts we can gain required through passes entry and exit sentinel. The low enforcement gives the employs various efficient and effective trace back techniques. If it attract when downloaded illegal files on illegal information from the World Wide Web.

To make this type of strategy work, enforcement maximizes the probability to selects the sentinels as entry and exit nodes. This probability called as catch probability.

There are few challenging issues,

Tor circuit does not allow taking the two class c address in a subnet. Does it have different enough IP address?

To maximize the profit we need to invest our investments on cloud computing.

5.3.2 IP range of amazon elastic compute cloud:

In the elastic compute cloud IP address is static IP address and t is designed for dynamic cloud computing. The IP address is controlled by user until choose to explicit release it. Elastic compute cloud gives it virtual instances across the different multiple data for provide fault tolerance. Region is a comprised different availability zone. There are eight availability more are locating in east one and us is west us and one ix located in Europe.

Electronic IP address provides users to availability zone failures are remapping programmatically user public IP address replace or reconfigure user hot rather waiting on a data technician. We can search the Google on the keyboard "Amazonas" IP range and network range or IP address or domain names of amazon network services.

6. SOLUTIONS TO PREVENT COMPUTER CRIMES:

6.1 How to avoid Getting Hacked:

Install the good and more life time anti virus software’s and update that software’s regularly. Most of the licenced and branded anti-viruses offer easy update.

 There are some people forming the group and solving the hackers attacks

1. CERT (Computer Emergency RESPONSE TEAM)

2. FIRST (Forum Of Incident Response and Section Team)

The following steps are to reduce the danger of getting hackers.

Do not click or accept the files from unauthorised sources because these

Unknown files are set as an attachment or set you while your chatting.

Do not download files from unauthorised sources.

Do not accept the files even from authorised person before accepting 1st check and scan with anti-viruses.

Change your passwords regularly. Use numbers and special characters in the password. Never use the simple type of names for passwords. Mainly date of births, names are easily traced.

Firewalls:

Firewall is a one of the protection system software; firewall is lies b/w the computer and Internet. The firewall is does not allow through a un authorised access from internet. Firewall is analysing entering data from the Internet uploading the data from computer based on the computer configuration. It ignores the data unknown or unauthorized or unsecured or un specious location. Firewall is place a major role in the download’s from the network and its gives a secure barrier against attacks coming from the Internet.

Password Protection:

A password that is very difficult to detect by both computer programmes and humans. It protect the information from the unknown activates. A secure password contains at least eight characters and numeric keys and special keys like (@, #, $, %, etc.). Password is a case sensitive it can contains capital letters or small letters or both small and capitals in the password. A password does not contain easily identified words like names, surnames and date of birth of a user.

3.3 Viruses:

Anti-virus software’s are designed for protecting the computers from worms and Trojan Horses. Any nasty software code that was already damaging the data we can use the virus protection soft wares. Several protection soft wares are now connecting with the anti-malware and anti- spyware capabilities to work with the anti-virus soft wares. Internet security groups are providing different type of anti-virus software’s for the protection.

3.4 Encryption:

Description of the data into a secret code. For getting data privacy encryption is the most effective way. If you want to access a secret key or a personal passwords to enables the descript file through to read an encrypted file. Plain text is coming on unencrypted data and cipher text is discussed as a encrypted data.

Conclusion:

Internet using people are increasing rapidly as much as we need to provide the security for Internet. To avoid the cyber crimes use the password and change the passwords regularly and use the passwords with numbers and special characters and do not using names surnames and DOB as passwords, because these are easily hacked.

Cyber crimes playing major role in the Internet world it affect every one and organizations as well as banking sectors. Cyber crimes increasingly breach the national borders. Every country perceived as heavens to run the risk of having e-messages blocked by the network. National governments must analyse in this kind of crimes discussed in the report. Every government must analyse in this kind of best practises from other nation to work together and give the solution against these crimes.

Our main aim is to avoid and preventing the cyber crimes as much as possible. Developing the complexity and prevention technology against the cyber crimes. Finally, the true nature of cyber crimes what will include in future is unknown. What was hacker is do in yesterday we will reduce that and create new problem in the future. To avoid set of passwords for every file and change the regular intervals between them.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now