May I know the types of cybercrime?

I'm doing a project on cybercrime.
May I know the types of cybercrime and how do they occur?
hokwAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

j2Commented:
That would differ between all countries, and for the US it differs between states.
0
Davy070599Commented:
Hi,

Go to support.microsoft.com and read article Q175312.  It explains your problem.

The key that has to be set to 'N' is the following:

HKEY_LOCAL_MACHINE\Software\Microsoft\OLE\EnableRemoteConnect

Byeee...

0
Davy070599Commented:
Sorry, wrong comment!


My comment for you should be: go to www.deja.com and search for cybercrime.  You'll find a lot of information concerning the theme.

0
Webinar: Miercom Evaluates Wi-Fi Security

It's not just about Wi-Fi connectivity anymore. A wireless security breach can cost your business large amounts of time, trouble, and expense. Plus, hear first-hand from Miercom how WatchGuard's Wi-Fi security stacks up against the competition in our upcoming webinar!

MorescaCommented:
Cybercrime is definitely a growing concern nowadays.  In my experience the reasons they happen, in no particular order of frequency are: curiousity, fame, acceptance, damage, public humiliation, political disagreement, embezzlement, greed, & infowar.  The types of cybercrime are numerous:
-Defacing a website to display one's dislike of a particular entity.
-Poisoning a DNS Server's cache to direct traffic to one's own site for personal gain.
-Hacking a host for the fun of it.
-Hacking a host to acquire proprietary information for numerous reasons.
-Hacking .gov or .mil sites to bring potential national security concerns to light.
-Hacking financial institutions for monetary gain.
-Hacking government systems to try to achieve electronic collapse of their infrastructure.
-Doing it just for the hell of it.

    Although these are few reasons why cybercrime might be pursued, they are a reality and each and every one has happened on numerous occasions.
As for the hows, you'd better check that out on your own...
Have a look at:
http://www.securityfocus.com
http://www.l0pht.com
http://www.psycom.net/iwar.1.html
http://www.rootshell.com
http://www.technotronic.com
http://www.rhino9.com
....too many to list.
    Also check out:
#hackphreak
#enforcers
#hackers
etc., on IRC
That should get you on the right track.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
jjmcdCommented:
Moresca makes an interesting comment.  It can be incredibly enlightening to go to efnet's #hack and sit for a few evenings.  You won't get a straight answer to any questions you post there, and the signal to noise ration ain't so hot, but if you watch for a while you can learn a lot.
0
AwmytieCommented:
http://www.fbi.gov and click on Search.  You'll find some interesting stuff.
0
RoadWarriorCommented:
Other examples of cybercrime are,

cyberstalking:- hassling/harrassment of a user via email or other means.

piracy:- up or downloading of copyrighted software

credit card fraud via online purchasing

some sexually oriented activity online may be a crime where the user concerned is resident, a pretty general example is paedophilic activities, but may also be related to homosexuality (in a lot of US states in fact), or even just plain nudity (Arab/moslem countries)

Racism online may also be criminal according to it's form and intent and again based on locality.

Basically anything that can involve an abuse or misuse of information can be regarded as cybercrime.
0
gonzal13RetiredCommented:
The FBI does allot of monitoring, from talking to a few of them. Tyey will monitor a person's e-mail activity based on input from various informants.
0
hokwAuthor Commented:
Thanks a lot! I've found what I wanted. My project is
now over.
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Hardware

From novice to tech pro — start learning today.