Academic Journals Database
Disseminating quality controlled scientific knowledge

Dal computer crime al computer-related crime

Author(s): Antonio Apruzzese

Journal: Rivista di Criminologia, Vittimologia e Sicurezza
ISSN 1971-033X

Volume: I;
Issue: 1;
Start page: 55;
Date: 2007;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Digital identity theft | Phishing | Computer networks | Pharming | Keylogging | Computer crime | Organized crime

Nowadays, Digital Identity Theft has become one of the most lucrative illegitimate business. Also known as “phishing”, it consists in unauthorized access to an individual’s personal financial data aiming to capture information relative to on line banking and on line financial services. At the beginning people were the victims of such scams, currently the attention is directed to computer networks. “Pharming” and “keylogging” are some of the latest and utmost sophisticated data processing techniques used by computer crime fraudsters. Latest entries are the “botnets”, herds of infected machines, usually managed by one sole command centre which can determine serious damages to network systems. Botnets have made large scale identity theft much simpler to realize. Organized crime is becoming more and more involved in this new crime world that can easily assure huge profits. The Italian State Police, in order to respond more effectively to this new rising challenge, has created, with the Postal and Communication Police, an agency highly specialized in combating such new phenomenon

Tango Jona
Tangokurs Rapperswil-Jona

     Affiliate Program