Icl M - 5
Icl M - 5
Icl M - 5
LAWS
FOUNDATION COURSE II CO 1221
SECOND SEMESTER BCom DEGREE
UNIVERSITY OF KERALA
Virus:
A virus is a type of malware that attaches itself to legitimate programs
or files and spreads from one computer to another when the infected
program is executed. Viruses can cause damage by corrupting or
deleting files, slowing down system performance, or allowing
unauthorized access to the system.
Worms:
Worms are standalone malware programs that replicate themselves to
spread across networks and systems, often exploiting security
vulnerabilities. Unlike viruses, worms do not require a host program
to attach themselves to and can independently propagate and
execute.
Adware:
Adware is a form of malware that displays unwanted advertisements or
pop-ups on a user's device. Adware is often bundled with legitimate
software and can generate revenue for attackers through pay-per-
click advertising schemes.
Ransomware:
Ransomware is a type of malware that encrypts a victim's files or locks
their device, rendering it unusable until a ransom is paid.
Ransomware attacks are designed to extort money from victims in
exchange for restoring access to their data or devices.
Rootkit:
A rootkit is a type of stealthy malware that enables unauthorized access
to a computer or network while concealing its presence from
detection by antivirus or security software. Rootkits are often used to
maintain persistent access for attackers and can be difficult to
remove.
Botnet:
A botnet is a network of compromised computers (known as bots or
zombies) that are controlled remotely by attackers. Botnets are often
used to carry out coordinated attacks, such as Distributed Denial of
Service (DDoS) attacks, steal sensitive information, or distribute spam
and malware.
19. Financial Crimes
• Financial crimes refer to a wide range of illegal activities that are
committed with the intent of gaining financial benefit through
deceptive, manipulative, or illicit means. These crimes often involve
fraudulent practices, misappropriation of funds, or illegal transactions
that undermine the integrity of financial systems and institutions.
Financial crimes can have serious consequences, including financial
losses for individuals and organizations, as well as broader economic
impacts.
Cyber contraband – Cyber contraband refers to illegal or prohibited
goods, materials, or services that are traded or distributed through
online platforms or digital channels. This can include items such as
counterfeit products, illegal drugs, pirated software or media,
weapons, or other contraband goods that are sold or exchanged via
the internet or dark web. Cyber contraband transactions often
circumvent legal regulations and pose significant challenges for law
enforcement agencies tasked with combating online crime.
Cyber laundering – Cyber laundering, also known as cyber money
laundering, refers to the process of concealing the origins of illegally
obtained funds or assets through online platforms, digital
transactions, or virtual currencies. Cyber laundering techniques
leverage the anonymity and global reach of the internet to transfer,
convert, or disguise illicit proceeds in order to make them appear
legitimate or "clean”.
20. Intellectual Property Crimes
Intellectual property (IP) crimes involve the unauthorized use, theft, or
infringement of intellectual property rights, which include creations
of the mind such as inventions, literary and artistic works, designs,
symbols, names, and images used in business. These crimes
undermine the value of intellectual property and can result in
financial losses for creators, innovators, and rights holders. Common
types of intellectual property crimes include copyright infringement,
trademark counterfeiting, patent infringement, and trade secret
theft. IPR crimes include:
Software piracy – Software piracy refers to the unauthorized copying,
distribution, or use of software without the proper license or
permission from the copyright holder. This includes making illegal
copies of software, sharing license keys or activation codes, or
downloading pirated software from unauthorized sources.
Cyber Squatting – Cyber squatting, also known as domain squatting,
refers to the practice of registering, trafficking, or using internet
domain names with the intent of profiting from the goodwill
associated with someone else's trademark or brand.
Meta Tagging – In the context of intellectual property crimes, meta
tagging can be used to misappropriate or infringe on trademarks,
copyrighted material, or brand names by including them as hidden
keywords or descriptions in webpages. This can deceive search
engines and users into visiting irrelevant or misleading websites.
21. Cyber extortion – Cyber extortion refers to a type of criminal activity
where perpetrators use threats or coercion, typically via digital
communication methods, to demand money, services, or other
concessions from individuals or organizations under the threat of
exposing sensitive information, disrupting operations, or causing
harm.