Category: Cyber Crimes Terms

This defines various tech terms used in cyber offences.

  • Cyber Crimes Tech Terms

    SPAMMING

    This term is used for emails send to unwanted, unwilling emails recipients by the various stake holders i.e for marketing purposes. It is also refers as Junk mail. It is sometimes used to cheat others.

    SPOOFING

    It is using incorrect identification, misrepresentation and dodging by using digital gadgets. In this situation wrong originating address is put on TCP/IP packet. This technique is used in Denial of Services attacks (DoS) and Distributed Denial of Services (DDoS) attacks.

    HACKING

    It refers to the research base activities performed to make solution of some programming based data, networks and digital systems. It can be used both for lawful and unlawful purposes. Hacking remains solution of many problems in digital world but unfortunately term is more referred in negative sense and almost it is referred for unethical or unlawful research by unauthorized entry to computer systems.

    CRACKING

    It is unlawful hacking, unauthorized penetration into computer or digital systems for wrongful gains.

    DATA LEAKAGE

    It is unauthorized transfer of data from computer or storage devices to another device by various means. This transfer can be physical or remote. Physically it is done by transfer through USB or disk, CD etc. Remotely it is done though infringing upon some computer network.

    EASTER EGG

    It is a surprise portion of a software program which is undocumented and unauthorized. It is used in negative sense that developer dishonestly add some malicious function to a software program for his own purposes.

    MALWARE

    A malicious software program used for hidden purpose best known to his developer. Malware are normally used with the pirated software. They are used for fetching information and also used in data leakage. They are also undocumented and unauthorized.

    VIRUS

    Viruses are computer programs which can disrupt the normal processes of a software. They silently enter in the coding of a software and then damage it and creates problems in its normal functioning.

    CYBER STALKING

    It is threatening, harassing an individual or group of people or an organization by means of digital or internet or electronic gadgets. The identity of offenders may be known or unknown. It is declared an offence under various laws of enforced round the globe. Its penalty can vary from country to country.

  • Spoofing

    The word “spoof” means dodge, trick or deceive. Therefore, in the internet or information technology world, spoofing refers tricking, deceiving computer system, web surfers, dodging and digital systems. This is normally done by hiding one’s identity or faking the identity of another user on the Internet.

    Spoofing can take place on the Internet in different ways.

    1. Spoofing by Emails
    When one used the email ID of another to dodge his identity, it means he is doing spoofing via email. To dodge, trick and concealing one identity is basic ingredient of spoofing. Computer systems
    One common methodology is by using e-mail ID. In e-mail spoofing one sends messages from a bogus e-mail ID or from a fake e-mail address of another user. Currently, Most e-mail servers have security features that prevent unauthorized users from sending messages. However, spammers often send spam messages from their own SMTP, which allows them to use fake e-mail addresses. Hence, it is possible to receive e-mail from an address that is not the actual email address of the person sending the message.

    2. Spoofing by IP
    Second method of spoofing is via Internet Protocol (IP) spoofing. This can be done by masking the IP address of a certain computer system. By hiding or faking a computer’s IP address, it is difficult for other systems to determine where the computer is transmitting data from. Because IP spoofing makes it difficult to track the source of a transmission, it is often used in denial-of-service attacks that overload a sever. This may cause the server to either crash or become unresponsive to legitimate requests. Fortunately, software security systems have been developed that can identify denial-of-service attacks and block their transmissions.

    3. Spoofing by fake identity
    Spoofing can be done by simply faking an identity, such as an online username. For example, when posting on an web discussion board, a user may pretend he is the representative for a certain company, when he actually has no association with the organization. In online chat rooms, users may fake their age, gender, and location. This is the most used method on internet. This phenomenon has become common on many social media sites.
    While the Internet is a great place to communicate with others, it can also be an easy place to fake an identity. Therefore, always make sure you know who you are communicating with before giving out private information.