New the four main time-tested,real-world crimes:1. Forgery (of E-mail)2.

New times bring new crimes. It’s a story as old as humanity and as newas the Internet. First come cars, and then car thieves. Telephones arefollowed by telephone fraud.Now we’ve got computers . . ..To make home, school, and office life easier, society relies oncomputers. As a result of this dependency, computer use growseveryday. Along with the growing use of computers comes widespreadcomputer crime. With the Internet becoming increasingly popular, moreand more people are becoming computer literate, and networks arebecoming more readily accessible. The rise in computer crime caneasily be blamed upon the increasing number of users. The Internet iswidely deemed as a new community. Either way you look at it, theInternet offers cover for con artists and plenty of places wherelarceny can lurk. The most common crimes committed via technologymedia are the same basic variations of the four main time-tested,real-world crimes:1. Forgery (of E-mail)2. Assault (on your Web site, E-mail box, or computer system)3. Fraud (cyber scams) and4. Robbery (theft of valuable information)Various types of people commit computer crimes. The two most familiarbeing hackers and crackers. A hacker is a person who enjoys exploringthe details of a programmable system and how to stretch theircapabilities. A cracker is one who breaks security on a system.Although hackers and crackers both break into computer systems, theirmotives are different. Hackers seem to break into computer systems forthe intellectual challenge. Crackers are considered malicious with theintention of harming or causing damage to a computer system. Themotivations behind crackers’ actions are profit, revenge or a mixtureof the two.There are six common types of characterised computer attacks by myknowledge:· Military/Intelligence Attacks· Business Attacks· Financial Attacks· Terrorist Attacks· Grudge Attacks· Reasonless AttacksHow are computer crimes committed? Break-in methods include alteringinput, theft of computer time, software theft, data theft/modificationand output theft. Software theft is a large problem in the softwareindustry. Not only does software theft contribute to loss of sales,but it also adds to the spread of computer viruses. Two examples ofsoftware theft are the production of illegal copies of software andthe creation of software used to break into systems. Data theft isanother way of committing a computer crime. Various techniques areused to commit computer crimes including a trapdoor, round down,salami, masquerading, and eavesdropping. Masquerading relates tosoftware theft. By using a legitimate user’s login name and passwordto gain access to a computer system, a criminal could masquerade asyou on your UOB user area, use your printer credits and even stealyour work. We also should always be extremely cautious about releasingany important information on the web. Even secured transactions arenot always safe from fraud, as tools used to break into computersystems can be obtained easily. Many can be found on undergroundInternet sites, discussion groups, or private bulleting boards on theweb. A few sites I have mistakenly come across are: