Page 139 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 139

E-Commerce and E-Business



                          In 1969, the  world’s first packet switching network Advanced Research Projects Agency Network
                          (ARPANET) emerged. It was used to connect computers in universities, defense contracting companies,
                          and research laboratories. This linked hackers all  over the world and  led to the development of a
                          distinct hacker culture. The emergence of personal networked computer in the 1980s led to the further
                          development of the hacker culture over the next decade. The movie War Games, which was released
                          during 1983, popularized the image of the hackers.
                          In 1978, a couple of computer enthusiasts in Chicago put the first civilian bulletin board system online.
                          These systems allowed users to interact online with other users and share information. Some of these
                          bulletin boards were used to trade pirated software and stolen credit card data. In 1981, Ian Murphy
                          was the first person to be prosecuted in the US for hacking. Murphy hacked into AT & T’s system and
                          changed the clocks that metered billing because of which the subscribers were charged night rates for
                          calls made during the day.
                          In 1988, Robert Tappan Morris, a graduate student of Cornell University released the first worm over
                          the Internet. The worm was released with the intention of showing the inadequacy in Internet security.
                          However, the  worm spread around the country causing a lot of damage. Morris was prosecuted
                          federally under the federal Computer Fraud and Abuse Act. This incident led to the formation of CERT
                          at Carnegie Mellon University.
                          In 1994, a 16-year-old student, nicknamed “Data Stream” was arrested by the UK police for hacking into
                          computers at the Korean Atomic Research Institute, NASA, and several US govt. agencies. In 1997, the
                          freeware tool AOHell made it easy for  unskilled  hackers to penetrate America Online and cause
                          extensive damage. In 1999, David Smith created and released the deadly Melissa virus.
                          In 2000, Microsoft was subjected to a Denial of Service (DoS) attack. This attack targeted domain name
                          servers and corrupted the DNS paths, permitting users to access the Microsoft's Web sites. This attack
                          prevented millions of users from accessing Microsoft Web pages for two days.
                          In the recent years with the growth and advancement in technology there has been an increase in the
                          usage of personal computers and Internet. All these advancements resulted in increase of cybercrimes.
                          Hacking has become more popular along  with online extortion and cyber terrorism. Due to rise in
                          cybercrimes there is a need to bring in certain preventive measures to control them. Several mechanisms
                          and policies were adopted to control these crimes some of them include strict user authentication, data
                          integrity and secure communication.

                          11.2.2   Types of Cybercrimes
                          Cybercrime may be broadly classified under the following three groups:
                          1.  Against individuals
                          2.  Against organization
                          3.  Against society at large
                          1.  Against Individuals: The following crimes can be committed against individuals:

                              (a)  E-mail spoofing
                              (b)  Harassment via e-mails
                              (c)  Cyber-stalking
                              (d)  Dissemination of obscene material
                              (e)  Indecent exposure
                              (f)  Cheating and fraud

                              (g)  Defamation









                          132                  LOVELY PROFESSIONAL UNIVERSITY
   134   135   136   137   138   139   140   141   142   143   144