It is an act of stalking, harassing, or threatening someone using the Internet, Computers Smartphones, etc as a medium. This is often done to defame a person and use email, social networks, instant messenger, web-posting, etc. The behavior includes false accusations, threats, sexual exploitation of minors, monitoring, etc.
It is an act of possessing an image or video of a minor (under 18), engaged in sexual conduct. Several criminals on the internet set up sites that show child pornography or consume these videos for self-gratification, which is a crime and unethical. The dark web which can be accessed using TOR consists of several websites that still host content like these. Still governments around the world are trying to catch these criminals.
It is the use of a computer to forgery and counterfeiting a document. With the advancement in hardware and software, it is possible to produce counterfeit documents that match the original document to such an extent that it is not possible to judge the authenticity of the same without expert judgment or advanced tools.
Software piracy is the illegal reproduction and distribution of software or digital content for personal or business use. It comes under crime related to IPR (Intellectual Property Rights) infringement. Some of the other crimes under IPR infringement are; the download of songs, downloading movies, etc.
It is defined as the use of computer resources to intimidate or coerce the government, the civilian population, or any segment thereof in furtherance of political or social objectives.
It is a process of acquiring personal and sensitive information of an individual via email by disguising it as a trustworthy entity in an electronic communication. The purpose of phishing is identity theft and personal information like username, password, credit card number, etc. This may be done to steal money from a user's account or to take revenge by sending abusive messages to other contacts.
If a telephone is used as a medium for identity theft, it is known as Vishing (voice phishing). Another form of phishing is Smishing, in which SMS is used to lure targets.
It is an act of physically destroying computer resources using physical force or malicious code.
It is a practice of modifying computer hardware or software to accomplish a goal outside the creator's original purpose. The purpose of hacking a computer system may vary from simply demonstrations of the technical ability to stealing, modifying, or destroying information for social, economic,c or political reasons.
There are several different kinds of hackers like;
Out of these Black Hat Hacking is usually considered a criminal activity.
Sending of unsolicited and commercial bulk messages over the internet is known as spamming. An email can be classified as spam if it meets the following criteria;
These spam emails not only irritate the recipients and overload the network but also waste time and occupy the valuable memory space of the mailbox.
It is an activity that involves injecting a malicious client-side script into a trusted website. As soon as the browser executes the malicious script, the malicious script gets access to the cookies and sensitive information and is sent to remote servers. Now this information can be used to gain financial benefit or physical access to a system for personal interest.
Many genuine websites offer online auctions over the internet. Taking advantage of the reputation of these websites, some of the cyber criminals lure the customers to online auction fraud schemes which often lead to either overpayment of the product or the item is never delivered once the payment is made.
It is an act of reserving the domain names of someone else's trademark with the intent to sell it afterward to the organization that is the owner of the trademark at a higher price.
These are malicious codes inserted into legitimate software. Some specific condition triggers the malicious action. If the conditions hold in the future, the malicious action begins, and based on the action defined in the malicious code, they either destroy the information stored in the system or make the system unusable.
The hacker gains access to an organization's website and either blocks it or modifies it to serve political, economic, or social interests. For example, there was an incident where one country displayed its flag on another country's website for several hours. This was a geopolitical act to showcase the technical expertise of hackers from one country.
Hacking the username and password of the ISP of an individual and surfing the internet at his cost is Internet Time Theft.
It is a cyber attack in which the network is choked and often collapsed by flooding it with useless traffic and thus preventing legitimate network traffic.
It is an attack that proceeds with small increments and finally adds up to lead to a major attack. The increments are so small that they remain unnoticed. An example of a salami attack is gaining access to online banking of an individual and withdrawing amounts in such small amounts that it remain unnoticed by the owner. Often there is a default trigger set in the banking website and transactions below say, Rs. 1000 withdrawal are not reported to the owner of the account. Withdrawing an amount of Rs. 1000 over some time will lead to a total withdrawal of a large sum.
It is a practice of changing the data before it is entered into the computer system. Often the original data is retained after the execution of the data is done. For example, DA, or the basic salary of the person is changed in the payroll data of an individual for pay calculation. Once the salary is calculated and transferred to his account, the total salary is replaced by his actual salary in the report.
It is a process of changing the header information of an email so that its source is not identified and it appears to an individual at the receiving end that the email has originated from a source other than the source.
No comments yet.
You must be logged in to leave a comment. Login here