Page 142 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 142

Unit 11: Cyber Security and Crime





                          We can prevent information hacking by adopting the following measures to set difficult
                          passwords:
                          1.  Using alternate capital and lower-case letters in random order.
                          2.  Using figures instead of letters for instance, 5 can be written as S
                          3.  Typing few words with the keyboard layout of other language.
                          A complex password is a random combination of figures and letters, for example,
                          8EHnL4K8

               4.   Cyber Stalking: It involves the following:
                    (a)  Following a person's movements over the Internet by posting threatening messages on the
                       bulletin boards frequently visited by the victim.
                    (b)  Entering the chat-rooms frequently visited by the victim.

                    (c)  Bombarding the victim with e-mails constantly.

                                A Glendale based businessman spied on his ex-girlfriend with the help of a GPS
                                tracking device (Nextel phone device) on a cell phone. The device was embedded
                                with a motion switch that turned itself on when it moved. The businessman
                                installed the phone under his girlfriend’s car. When the device was in on mode, it
                                transmitted a signal to the GPS satellite which traced the location information and
                                forwarded it to the computer. The victim realized about the monitoring just after
                                the phone was found underneath her car.

               5.   Data Diddling: Data diddling involves modifying raw data just prior to the computer processing.
                    The data is then changed to its original form after the processing is completed.


                                Indian Electricity Boards were victims of data diddling. They were targeted when
                                the private parties were installing their systems.
               6.   E-mail Bombing: E-mail bombing involves sending a large number of e-mails to the victim which
                    crashes the e-mail account or mail servers.

                                A foreigner who had been residing in India for almost thirty years wanted to avail
                                a scheme introduced by the Shimla Housing Board to buy land at lower rates. The
                                person’s application was rejected on the grounds that the scheme was available
                                only for citizens of India. The person decided to take revenge and consequently
                                sent thousands of e-mails to the Shimla Housing Board till their servers crashed.
               7.   Salami Attack: These attacks are used for the commission of financial crimes. An important
                    feature of this type of attack is that the alteration is so small that it normally is not noticed.

                                A bank employee inserted a program into  the bank's servers. This  deducted a
                                small amount of money from the account of every customer. No account holder
                                noticed this unauthorized debit, but the bank employee was able to accumulate a
                                sizable amount of money every month.
               8.   Internet Time Theft: In these kinds of thefts the Internet browsing hours of the victim are used up
                    by another person.












                                    LOVELY PROFESSIONAL UNIVERSITY                          135
   137   138   139   140   141   142   143   144   145   146   147