Description Of Technical Research Area

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Introduction

Cybercrime is illegal action done by using computers and Internet. This includes downloading files from illegal website to stealing billions of moneys from bank accounts. Cybercrime includes internet crimes, such as establishing and allocating viruses on another computers or posting trustworthy business info on the Internet.

Besides that, the most obvious form of cybercrime is the identity theft, in which hackers use the Internet to steal private information from other people. There are two ways that has done is through phishing and pharming. Both of these ways trap users to fake websites, where they are asked to enter own information. This includes login data, such as id name, credit card numbers, bank accounts, and other information that hackers can use to "steal" another person's information. Therefore, users need to check the URL or Web address to make sure it’s safe to enter your personal information.

Lastly, cybercrime covers such a broad scope of illegal action and the examples above are mentioning a few of criminalities that are known as cybercrimes. While communication technology have helps our lives easier, unfortunately there are people use these technologies to take advantage from innocent users. Besides that, there is a way to protect yourself by installing an antivirus and increase the internet filter and being careful when you enter your personal information.

Objective of Research

The topic that I choose is Cyber Crime. The reason I choose this topic is because it a topic that attract me but the fact is that nowadays the cases have increased rapidly. This research help others user to be aware when entering personal’s information on illegal website and download files carefully. Throughout, this research I learn in more depth about the topic I have chosen and I have written the important detail about cybercrimes.

Description of research area

Any illegal act dealing with computers and systems are called Cybercrime. Moreover, cybercrime also includes crimes that lead through the Internet. Such as Internet scam, hate crimes, and credit card hackers are well-thought-out to be cybercrimes when the illegal actions are dedicated through the use of a computer and Internet. Cybercrime can take many forms and can happen in anytime or anyplace. There are three ways of computer crime that had been organised.

The computer as a victim and controlling the computers of others by spreading viruses.

The computer as a weapon using a computer to oblige "computer crime" that we see in the corporeal world (such as scam or illegal betting).

The computer as equipment and using a computer to save prohibited or stolen data.

Cybercrime can be done in many ways and the most common ways are pharming, phishing and hacking.

Pharming

A process used by hackers to trap users into trusting that they are cooperating with a legal Web site. Pharming is a way hackers try to control users on the Internet. While phishing tries to steal personal information by trapping users to visit a phony web site and pharming transmits users to untruthful websites without them notice it. Besides that, it also called as an online scam that attacks the location bar.

Phishing

Phisher pretend to be a monetary organisations or businesses and send junk mail or pop-up mails to trap you to enter your personal’s data. Internet scammers use e-mail lure to "phish" for PINs and monetary data from the sea of Internet users. Phishing is illegally and dishonestly bait of users in exposing their personal information by using a social business like sending mail contain of URL, download and install key logger in victims' machine. It also can create a fake web by having the same interface and domain name that tough to be differentiated by the targets.

Hacking

Hacking is the act of illegal activities via a computer is mostly due to unawareness on the writer’s part. Additionally, hacking is basically illegal entree to a computer or system. It could be the unauthorized hacker used of one system to get the entree for another system. In many illegal web addresses on the Internet, there are benefits available to help in "hacking".

Description of Technical Research Area

Numerous different types of pharming attacks have now been recognised. Pharming can also be carried out by using methods like DNS cache poisoning, domain hijacking, DNS server hijacking and modification the firmware of router device. Some of the more existing are listed below

Sending Email

Pharming is carried out by attackers in quite a lot of technique. The pharmer will send email that contained of viruses to the unlucky user and it will download and run on the computer. The receiver of the email can be tricked by the pharmers although they did not run or download the files in the mail. The viruses contained in the email will install a software and it will try to forward the victims to the illegal website when the victims try to visit an authorise website. Pharming can also be happened by not sending email.

DNS Cache Poisoning

DNS cache poisoning can be carry out by taking of DNS software exposed to "poison" the cache that saved queries made by user in certain of time in order to improve the speed. When user makes queries at the DNS, the user will be forward to the fake website after the cache being "poison".

Domain Hijacking

Domain hijacking is a method to avoiding the authorization of the old domain recorder and the domain owner where the change of domain recorder can only be making with the approval from three parties, the domain owner, old and new recorder.

Malconfiguration of Setting or Rewrite Firmware of Router

Pharming can also be done through malconfiguration of setting or rewrite the firmware of the router. Once the setting or firmware of the router being configure, the computers that connected to the router will automatically redirect to the DNS server that control by the attacker when they try to visit a website. This technique is being used for pharming because the change of setting or firmware of router is hard to detect and the malicious firmware will work as how the manufacture's firmware works. In addition, the administration page and setting of the router will still remain the same.

DNS Server Hijacking

Pharming also can be performing through DNS server hijacking. DNS server are responsible as the signposts of internet which it will change the domain name into the IP address. To hijack a DNS server, the attacker will first targeted the DNS server on the LAN or DNS server hosted by the ISP to change the IP address of an authentic website's domain name to the IP address of fraudulent website. When user tries to visit the authentic website, queries will be makes on the DNS server for the IP address of the domain name. Because of the IP address of the domain name had been changed, it will redirect user to the fraudulent website. When user being redirect to the fraudulent website, they will perform the activities that they wish to perform at the website because the address display in the address bar remain the same with the authentic website's address and they think that they are accessing the authentic website. Through the activities that perform by the user, attacker will be able to obtain the information that they wish to obtain. The website that always targeted by the attackers is normally those address that start with HTTP but not HTTPS because the website is without SSL protection.

Attacker targeted the DNS server on the LAN or DNS server hosted by the ISP to change the IP address of an authentic website's domain name to the IP address of fraudulent website

User tries to visit the authentic website

Queries will be makes on the DNS server for the IP address of the domain name

The IP address gathered from the DNS server is the IP address of fraudulent website

User is being redirected to the fraudulent website



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now