For example, hacking involves attacking the computer’s information and other resources. It is important to take not that overlapping occurs in many cases and it is impossible to have a perfect classification system. There are so many varieties of crimes that are committed on the Internet daily; some are directed to the computer while others are directed to the computer users. When researching this topic, I have identified some common crimes committed daily in Nigerian networks.
1. Spamming
Spamming is the act of sending unsolicited messages to many users at a time, possibly up to thousands, with the usual intention of advertising products to potential customers. Spamming is usually random and untargeted but it can be targeted to either a group of people, or certain persons. There are categories of spammers. Spammers are classified into two major faces: A. Hucksters: Hucksters are characterized by slow turnaround from harvest to first message (typically at least 1 month), a large number of messages being sent to each harvested spam trapped addresses, and typical product based spam (i.e. spam that is selling an actual product to be shipped or downloaded even if the product itself is fraudulent). B. Fraudsters: Fraudsters are characterized by an almost immediate turnaround from harvest to first message (typically less than 12 hours), only a small number of messages are sent to
References: Jun 28, 2006 – INTRODUCTION Crime and criminality have been associated with man since his fall. Crime remains elusive and ever strives to hide itself in the... Fortune (0015-8259) 4/8/2013