Page 140 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 140
Unit 11: Cyber Security and Crime
The following crimes can be committed against the property of individuals:
(a) Transmitting virus
(b) Computer vandalism
(c) Unauthorized access over computer system
(d) Internet time thefts
(e) Intellectual property crimes
Fraud by Employees of a Call Center
Caselet
Some employees of a call center gained the confidence of the customer and obtained their PIN
numbers to commit fraud. The employees transferred US $ 3,50,000 from accounts of four US
customers to bogus accounts. They got these under the pretext of helping the customers out of
difficult situations. Even though the call center had the highest security they could not prevent the
fraud from happening.
The call center employees are checked when they enter and exit the premises, to ensure that they
cannot copy down the numbers. But the employees memorized these numbers, went to a cyber cafe
and accessed the accounts of the customers.
All accounts were opened in the city where the call center was located and the customers complained
that the money from their accounts was transferred to the accounts present in that city. Thus, the
criminals were traced and the police was able to prove the honesty of the call center and have frozen
the accounts to which the money was transferred.
2. Against Organization: The following crimes can be committed against organizations:
(a) Possession of unauthorized information
(b) Cyber terrorism against government organizations
(c) Distribution of pirated software
(d) Unauthorized access over computer system
3. Against Society: The following crimes can be committed against society at large:
(a) Financial crimes
(b) Pornography
(c) Trafficking
(d) Online gambling
(e) Forgery
Here some of the crimes are discussed briefly:
1. Denial of Service: These attacks are aimed at denying access to authorized persons to a computer
or a computer network. These attacks can be launched with the use of a single computer or
multiple computers across the world. The victim’s computer is flooded with more requests than it
can handle which causes it to crash. Distributed Denial of Service (DDoS) attack is also a type of
denial of service attack in which the offenders are wide in number and widespread.
2. IP Spoofing: IP spoofing is used by intruders to gain unauthorized access to computers. Messages
are sent to the computer with the sender’s IP address of a trusted system by modifying the packet
headers.
LOVELY PROFESSIONAL UNIVERSITY 133