Você está na página 1de 3

Cyber Crime :

Cyber crime is

a. Spammed:
being inundated with unwanted and unsolicited email

b. Slammed:
being changed to another telephone carrier without prior approval

c. Scammed:
being swindled out of some part of your purchase or contract

d. pumped and dumped or crammed:

when a stock is prematurely promoted without reason and being
debited for a product you didn't ever purchase

1-Important Strategic Data Stealing:

Popular targets also include closely guarded company trade secrets, business
development plans, new product designs or takeover information. These thieves sell
the stolen information to the highest bidder for financial gain


review all URLs, don't give out personal information to unreputable persons or
requests ,install a fire wall on your computer, monitor all bank transactions
frequently, disable all active content functionality (e.g. Java), disable peer to peer
networking and use a credit card with a low limit exclusively for web purchases.

The IT 'techies' also suggest changing passwords frequently, not opening suspect
email attachments and to regularly use patches to update your computer security.

2-Interner Connection Hacking:

To access an online computer service or Internet service provider (ISP) one needs both a user
name and password. ISPs typically select a user name that is the same as the last name of the
subscriber. This means that user names are easy to guess, therefore one must be especially
careful with the password. In Pakistan Wireless internet user are more in no than other who are
victum of this crime.


Select a good password:

• Make the length of your password at least five characters. It is too easy for automatic
programs to sequentially try all combinations of characters in a password of only 1, 2, 3,
or 4 characters.

• In short passwords, use at least one upper-case letter, at least one lower-case letter, and at
least one digit, for example, c5U3rN
A five-character password composed of only random lower-case letters has about 8×106
possible combinations, but a five-character password composed of both upper- and
lower-case letters and the ten digits, all chosen randomly, has about 776×106 possible
combinations, i.e., about one hundred times harder to guess.

• To make a long password, use a concatenation of two words, each with at least five
characters, perhaps separated by one digit (e.g., airplane5style). By having a longer
password, it is no longer as desirable to include a mix of upper- and lower-case letters
and digits.

• Avoid obvious passwords e.g.,

o your name,
o anyone's first name (especially bad are your spouse's first name, your child's first
name, your dog's or cat's name)
o your nickname (e.g., "Flash" or "Buzz"),
o your home telephone number,
o your date of birth,
o your astrological sign,
o your mother's maiden name,
o your wife's maiden name,
o license plate number of your car,
o exact sequences of letters on a keyboard (e.g., QWERTY or ASDFGH)
o sequences from the alphabet (e.g., ABCDEFG or ABCABC)
o or any other publicly available information.

Also avoid any of the above spelled backwards, and any of the above either preceded or
followed by a single digit.

Cyber crime is criminal activity conducted over the internet and it is a threat to our society.