Question

Which problems does cybercrime pose to authorities seeking to investigate it?

Which problems does cybercrime pose to authorities seeking to investigate it?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Cybercrime: We can define Cybercrime as the crime that was done by using Digital assets or using Internet, in other words we can define that using computer or internet as an object to perform any illegal operations, such kind of activities come under cybercrime.

Kinds of Cybercrimes or cyber-attacks which leads to investigation

EavesDropping: Now a days the communication is being carried out as a form of Plain text or data, in this attack the attacker takes control over the communication channel and grabs the information that is being transferring, in this kind of attack the data will not be changed but the data that is being transferred is captured and recorded by the attacker during traversing of data through the network, this attack is very difficult to identify since there is no change in data the end user can’t identify the attack, we can call it as man in the middle attack

Here the data is not modified

                                           

Modification of data: in this kind of attack the data will be modified in between the sender and the receiver without the knowledge of each other, for example if you are trying to purchase something in online the cart data can be changed before payment or during payment the purchase details can be altered like the amount that need to be payed will be changed, this kind of attack is very dangerous since our data is no more secure with us.

Here the data is modified by the attacker without knowledge of sender and receiver

                                          

Reply Attacks: This is most dangerous attack because here the data belongs to a person will be hacked with out any knowledge to that particular person, for example let us consider a person has an account in some XYZ.com, which holds all his personal and financial data, an attacker can get the entire information just by using Reply attack.

Ex: http://XYZ.com/details.cgi?userID=xyz&pass=abc&[email protected]& &message="Get all data!"&submit=submit
 
This leads to get the entire information of the person from the website with out his knowledge
Social Attacks: Now a days we social media is main source of communication for every one, to express something or to know something we generally use Social media
                    One can know all the information about others if some one succeds in hacking their social accounts, like one can have hack your xyz.com account and can check all your personal details, or they can use your point of communication details for their business purpose or they can sell your personal data to some other companies which required them.
                    If some one wants to post some abbusive comments which are not acceptable, they can hack your social account and post them on your identity, which leads you to problem.
                    Some abbusive comments in social media relates to religion, governament, Organization or about any person etc.., also leads to investigation but the rules are depends on the geographical location where you are.
 
  
Add a comment
Know the answer?
Add Answer to:
Which problems does cybercrime pose to authorities seeking to investigate it?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT