CYBER CRIME INVESTIGATION - FAQs
Ans. It is the most common method for many number of cyber crimes. This involves the act of penetrating or gaining unauthorized access to a computer system or network with the purpose of destroying, stealing, or monitoring the data of that system or network.
Ans. These are harmful software of a standalone nature, i.e. they don’t need a host file to attach themselves. While present in a computer system they may cause disruptions like modifying the host operating system and many other.
They are different from viruses on the perspective that they don’t insert a copy of themselves to any other host computer programs in a system. They operate all on their own.
Ans. These are harmful coded programs which attach themselves to other programs, named as hosts, in a computer system, and replicate themselves every time such computer programs run, thereby spreading through the entire system make the computer crash, corrupt data etc.
There are many classifications of viruses based on their functionality. These include Boot viruses, File viruses, Multipartite viruses, Virus Hoax etc.
Ans. These are the programs which stay in guise of a harmless and beneficial program, without the victim’s knowledge. These programs perform malicious activities like, downloading malwares, deleting files, or even monitor activities of the victim, or saving the identity credentials etc. By instilling Trojan horses into a computer, varieties of cyber attacks can be executed.
Ans. Trap Doors are secret entry points of a computer program, which are mainly accessed by the developers in case of any minor modifications, without having to go through all the manual security protocols. However, attackers use this path to gain unauthorized access.
Ans. Logic Bombs are the programs, once they are injected in a computer system they stay dormant, and become active only at a pre-specified time period, like may be after a particular program is executed in that computer.
Ans. This involves monitoring the traffic of a user on a network, and recording the essential names and passwords while he is entering such data into the computer with the help of certain programs. Later on by using such data, a secured user’s account is penetrated.
Ans. Internet Protocol (IP) Spoofing involves forging with the IP addresses as it would seem that the source came from an inside network which the system trusts, but the address actually remain under the control of the attacker.
Forgery is an essential element for this offence.
Ans. E-mail Spoofing involves forging the mail address of an individual, and sending mails to the contacts / recipients of the victim from that mail address, as it would seem that the mails were originated from one source (the individual victim), but in fact they were sent from another source (attacker).
Forgery is an essential element for this offence.
Ans. This involves searching through the discarded computer documents and materials to get to know about any access code or password. In computer systems, sometimes the data which are presumed to be deleted, in fact still remains there, and the attacker may get access to them.
Ans. This involves using the internet hours which is paid by one person in an unethical manner by some other person without consent. This is basically carried out by hacking the ISP User ID and Password of the victim.
Ans. Session Hijacking involves exploitation of a valid web-session control mechanism where an attacker gains control over the session between two computers. Man In the Middle Attack is a classic example of this, where the attacker can stay in between two systems’ communications, and can alter the communications.
Ans. Web-jacking involves forcefully taking control of a website by means of mainly hacking, and unduly using the web-site as a real owner.
Ans. This involves sending unsolicited bulk messages indiscriminately by means of electronic messaging system. These messages are mainly commercial/ promotional/ advertising in nature. E-mail spamming is most prevalent.
Ans. This involves stealing of confidential data which resides in a computer system or server without permission of the legitimate owner.
Ans. This involves modification or alternation of data before or after it is entered and processed into a computer. Adding fraudulent input data, removing an existing data, or destroying an output data etc falls under this type of crime.
Ans. Many experts have categorized cyber crime under different aspects. Cyber crime can be against Operational security of a digital media; or can be against Physical security; or against Personal security; or against Communications and Data security. Under this light a lots of classifications are made with respect to different nature of cyber crimes.
Ans. Cyber crime is basically criminal in nature. However, it can impose civil liability upon the offender by way of compensation or fine. As per general notion, certain offences such as Domain Name Disputes, Online Trademark Infringement etc are also considered as cyber crimes by most people, where these offences are only civil in nature.