12.07.2015 Views

by Police - Bureau of Police Research and Development

by Police - Bureau of Police Research and Development

by Police - Bureau of Police Research and Development

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The Indian <strong>Police</strong> Journal<strong>and</strong> adult <strong>and</strong> child pornography. The anonymity <strong>of</strong> the Internetfacilitates the criminals to cause different types <strong>of</strong> Cyber Crimes,such as spamming, phishing, hacking, <strong>and</strong> denial <strong>of</strong> service, Networkintrusion <strong>and</strong> spreading <strong>of</strong> virus, worms <strong>and</strong> Trojans. The criminality commit cyber-warfare, cyber-terrorism, distribution <strong>and</strong> disruption<strong>of</strong> information, netspionage <strong>and</strong> cross-border attacks targeted acrossboundaries. Cyber Crimes are potential threats in virtual world equallyapplicable as compared to physical attacks.Cyber Crime Worldwide to steal information surreptitiously. Anonymity in the Internet <strong>of</strong>fersorganized criminals to target not only home users, even business,Government agencies <strong>and</strong> the like. This can be performed from the <strong>of</strong> international legislation or cooperation between countries to aidin investigations <strong>and</strong> arrest. As a result <strong>of</strong> this nefarious activity <strong>of</strong>organized criminals, who operate in the cyberspace, the globe isexperiencing a serious economic crisis. Cyber criminals or online into varying vectors. These are tabulated hereunder:Sl.No.Pr<strong>of</strong>essionalpositions categoryFunctions <strong>and</strong> area <strong>of</strong>operation1. Programmers Develop the exploits <strong>and</strong> the malware used toCyber Crime.2. Distributors Trade <strong>and</strong> sell stolen data <strong>and</strong> as voucher for thegoods provided <strong>by</strong> other specialists.3. Tech. Experts Maintain the criminal enterprise’s IT infrastructure,including servers, encryption technology, database,etc.4. Hackers Persons who search for <strong>and</strong> exploit applications,systems, <strong>and</strong> network vulnerabilities.5. Fraudster Individuals, who create <strong>and</strong> deploy various socialengineering schemes, such as phishing <strong>and</strong> spam.6. Hosted systemprovidersProvide service <strong>of</strong> hosting <strong>of</strong> rogue servers <strong>and</strong>92 January - March, 2013

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!