What are some of the characteristics of cyber crime? What are some of the characteristics of cyber crime that makes them especially difficult to investigate and prosecute?
__________________________________
home garden ~ home landscape ~ dark fruit cake recipe
characteristics of cyber crime Topic is solved
Moderator: jkerr82508
characteristics of cyber crime
Last edited by ishseena on 14 Dec 2013, 07:43, edited 1 time in total.
Re: characteristics of cyber crime Topic is solved
Sorry mate you are listed here. So you will be banned.
As to your legitimate question I will attempt an answer for others to enjoy.
Characteristics of a cyber crime are money and money and money. I do not regard the occasional download of music and films as cyber crime.
The organized crooks are often using phone calls to trick you into leaving control of your computer to them. They find you via Google, Facebook and social media.
The Microsoft scam is "classic" - some person calls and claims to be from Microsoft support and says your computer is infected so you need to take immediate action.
Since you are so lucky this person will help you to fix it.
If you listen to this falls "Microsoft" you will have given the crooks remote access to your computer. He can do anything he wants but it makes no sense to simply destroy your data.
So the "professional" ones will probably encrypt your entire disk and claim money from you for getting the encryption key.
This money will be cheaper than trying to break the encryption or re-format and re-installing everything.
These criminals are often from Nigeria and India.
Other lucrative cyber crimes are sniffers that try to get information like creditcard data passwords and bank account data etc
Sniffer software contains its own network driver and buffer memory in order to capture a large chunk of packets. Modern sniffers are capable of analysing the captured packets and converting them into sensible statistical information.
PS since you will not be able to answer to this I will anticipate that this answer was to your full satisfaction and call this solved
As to your legitimate question I will attempt an answer for others to enjoy.
Characteristics of a cyber crime are money and money and money. I do not regard the occasional download of music and films as cyber crime.
The organized crooks are often using phone calls to trick you into leaving control of your computer to them. They find you via Google, Facebook and social media.
The Microsoft scam is "classic" - some person calls and claims to be from Microsoft support and says your computer is infected so you need to take immediate action.
Since you are so lucky this person will help you to fix it.
If you listen to this falls "Microsoft" you will have given the crooks remote access to your computer. He can do anything he wants but it makes no sense to simply destroy your data.
So the "professional" ones will probably encrypt your entire disk and claim money from you for getting the encryption key.
This money will be cheaper than trying to break the encryption or re-format and re-installing everything.
These criminals are often from Nigeria and India.
Other lucrative cyber crimes are sniffers that try to get information like creditcard data passwords and bank account data etc
Sniffer software contains its own network driver and buffer memory in order to capture a large chunk of packets. Modern sniffers are capable of analysing the captured packets and converting them into sensible statistical information.
PS since you will not be able to answer to this I will anticipate that this answer was to your full satisfaction and call this solved
Manjaro 64bit on the main box -Intel(R) Core(TM) i7 CPU 920 @ 2.67GHz and nVidia Corporation GT200b [GeForce GTX 275] (rev a1. + Centos on the server - Arch on the laptop.
"There are no stupid questions - Only stupid answers!"
"There are no stupid questions - Only stupid answers!"