Vous êtes sur la page 1sur 4

ASSIGNMENT-1

List all possible ways of committing crimes using digital technology which you think can not be detected
1-Phishing:- Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity social web sites, auction sites, online payment sites. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. 2-Document Editing:-Changes in documents ,like do copy of signatures ,changes in marksheets,certificates,so they can not be detected easily. 3-Banks Related Fraud:y y y Copy of signature using scaning can not be detected at that moment of time. Alteration on Cheques:- Thieves have altered cheques to change the or the amount on the face of a cheque . Accounting fraud In order to hide serious financial problems, some businesses have been known to use fraudulent bookkeeping to overstate sales and income, inflate the worth of the company's assets or state a profit when the company is operating at a loss. These tampered records are then used to seek investment in the company's bond or security issues or to make fraudulent loan applications in a final attempt to obtain more money to delay the inevitable collapse of an unprofitable or mismanaged firm.
Demand draft fraud

Demand draft fraud is usually done by one or more dishonest bank employees. They remove few DD leaves or DD books from stock and write them like a regular DD. Since they are insiders, they know the coding, punching of a demand draft. These Demand drafts will be issued payable at distant town/city without debiting an account. Then it will be cashed at the payable branch. For the paying branch it is just another DD. This kind of fraud will be discovered only when the head office does the branch-wise reconciliation, which normally will take 6 months. By that time the money is unrecoverable. y Duplication of card information Some thieves have surreptitiously added equipment to publicly accessible automatic teller machines; a fraudulent card stripe reader would capture the contents of the magnetic stripe while a hidden camera would sneak a peek at the

user's PIN. The fraudulent equipment would then be removed and the data used to produce duplicate cards that could then be used to make ATM withdrawals from the victims' accounts. 4-Fake Websites:-fake Website can create wrong information among people. 5-Change in meter settings by Auto Driver:-by this he gain extra amount. 6-Cloning (telephony) has been used as a means of copying both the electronic serial number and the telephone number of another subscriber's 'phone to a second (cloned) 'phone. Airtime charges for outbound calls are then mis-billed to the victim's cellular 'phone account instead of the perpetrator's. 7-Cable Wire Fraud:-Usually people enjoy two /three cable connections by paying only for one. 8-Cramming is the addition of charges to a subscriber's telephone bill for services which were neither ordered nor desired by the client and These charges are often assessed by dishonest thirdparty suppliers of data and communication service that phone companies are required, by law, to allow the third-party to place on the bill. 9-Fingerprint Spoofing:Theives spoof the fingerprints and use it where require.

How can you do something malicious that nobody else has thought of yet using digital technology?
1-Fingerprint spoofing: People did not think that spoofing of fingerprint can happen but now it is possible.

How can you use things for some purpose for which they are not made for?
1-People use washing machine for water storage also. 2-Use hairclip for opening locks. 3-Use ruler for opening car door locks.

How can you use technology to change the way some frauds are committed?

1-Location Tracing:Previously people did location tracing by follow the person but now trend has change ,but now The Mobile Location Tracking Using GSM helps to track the current location of the mobile. Just load out application to your cell phone and enter the phone number of the cell phone to which you would like to pass the location data. 2-Banking Frauds-Previously people did bank fraud by manually copy the signatures on cheques but now they do by spoofing of cards ,digitally copy the signatures, by online banking transactions. 3-Previosly when thieves collect information about anyone then he usually ask to his neighbors by social engineering but now they are doing by sending phishing link.

What can you do so that such frauds (in the above parts) do not happen?
1-Increase awareness among people 2-Use biometric password(not only fingerprints because as we read above it is not secure so in addition of this use iris ) instead of text password. 3- Use good encryption algorithms.

4-Use latest and up dated anti virus software to guard against virus attacks.
5-Never send credit card number to any site that is not secured. 6-Never do login in cybercaf. 7-Do not use simple password and dont write it down anywhere.

What type of frauds do you think which happen in cyber world are inspired by conventional frauds in real life?
1-Location tracing 2-Banking frauds 3-Stolen of documents.

Can you think of a crime which only happens in cyber world but not in physical world ?
1-Website hacking 2-Phising 3-Session Hijacking:- Session hijacking is the exploitation of a valid computer session sometimes also called a session keyto gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a remote server. It has particular relevance to web developers, as the HTTP cookies used to maintain a session on many web sites can be easily stolen by an attacker using an intermediary computer or with access to the saved cookies on the victim's . 4-IP Spoofing:- Creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system.So only possible in cyber world

References:
http://en.wikipedia.org/wiki/Bank_fraud http://en.wikipedia.org/wiki/Phone_fraud http://en.wikipedia.org/wiki/IP_address_spoofing

Vous aimerez peut-être aussi