What are the different kinds of Cyber Crime?Rate:


Table of Contents
What are the different kinds of Cyber Crime?
Tags: Cyber Crime, Cyber Security

There are several cyber crimes that criminals do, some of them are discussed in the article below, so that you are aware of them and can be cautious while using your computers.

1. Cyber Stalking

It is an act of stalking, harassing, or threatening someone using the Internet, Computers Smartphones, etc as a medium. This is often done to defame a person and use email, social networks, instant messenger, web-posting, etc. The behavior includes false accusations, threats, sexual exploitation of minors, monitoring, etc.

2. Child Pornography

It is an act of possessing an image or video of a minor (under 18), engaged in sexual conduct. Several criminals on the internet set up sites that show child pornography or consume these videos for self-gratification, which is a crime and unethical. The dark web which can be accessed using TOR consists of several websites that still host content like these. Still governments around the world are trying to catch these criminals.

3. Forgery and Counterfeiting

It is the use of a computer to forgery and counterfeiting a document. With the advancement in hardware and software, it is possible to produce counterfeit documents that match the original document to such an extent that it is not possible to judge the authenticity of the same without expert judgment or advanced tools.

4. Software Piracy and Crime Related to IPRs

Software piracy is the illegal reproduction and distribution of software or digital content for personal or business use. It comes under crime related to IPR (Intellectual Property Rights) infringement. Some of the other crimes under IPR infringement are; the download of songs, downloading movies, etc.

5. Cyber Terrorism

It is defined as the use of computer resources to intimidate or coerce the government, the civilian population, or any segment thereof in furtherance of political or social objectives.

6. Phishing

It is a process of acquiring personal and sensitive information of an individual via email by disguising it as a trustworthy entity in an electronic communication. The purpose of phishing is identity theft and personal information like username, password, credit card number, etc. This may be done to steal money from a user's account or to take revenge by sending abusive messages to other contacts.

If a telephone is used as a medium for identity theft, it is known as Vishing (voice phishing). Another form of phishing is Smishing, in which SMS is used to lure targets.

7. Computer Vandalism

It is an act of physically destroying computer resources using physical force or malicious code.

8. Computer Hacking

It is a practice of modifying computer hardware or software to accomplish a goal outside the creator's original purpose. The purpose of hacking a computer system may vary from simply demonstrations of the technical ability to stealing, modifying, or destroying information for social, economic,c or political reasons.

There are several different kinds of hackers like;

Out of these Black Hat Hacking is usually considered a criminal activity.

9. Spamming

Sending of unsolicited and commercial bulk messages over the internet is known as spamming. An email can be classified as spam if it meets the following criteria;

These spam emails not only irritate the recipients and overload the network but also waste time and occupy the valuable memory space of the mailbox.

10. Cross-Site Scripting

It is an activity that involves injecting a malicious client-side script into a trusted website. As soon as the browser executes the malicious script, the malicious script gets access to the cookies and sensitive information and is sent to remote servers. Now this information can be used to gain financial benefit or physical access to a system for personal interest.

11. Online Auction Fraud

Many genuine websites offer online auctions over the internet. Taking advantage of the reputation of these websites, some of the cyber criminals lure the customers to online auction fraud schemes which often lead to either overpayment of the product or the item is never delivered once the payment is made.

12. Cyber Squatting

It is an act of reserving the domain names of someone else's trademark with the intent to sell it afterward to the organization that is the owner of the trademark at a higher price.

13. Logic Bombs

These are malicious codes inserted into legitimate software. Some specific condition triggers the malicious action. If the conditions hold in the future, the malicious action begins, and based on the action defined in the malicious code, they either destroy the information stored in the system or make the system unusable.

14. Web Jacking

The hacker gains access to an organization's website and either blocks it or modifies it to serve political, economic, or social interests. For example, there was an incident where one country displayed its flag on another country's website for several hours. This was a geopolitical act to showcase the technical expertise of hackers from one country.

15. Internet Time Thefts

Hacking the username and password of the ISP of an individual and surfing the internet at his cost is Internet Time Theft.

16. Denial of Service (DoS) Attack

It is a cyber attack in which the network is choked and often collapsed by flooding it with useless traffic and thus preventing legitimate network traffic.

17. Salami Attack

It is an attack that proceeds with small increments and finally adds up to lead to a major attack. The increments are so small that they remain unnoticed. An example of a salami attack is gaining access to online banking of an individual and withdrawing amounts in such small amounts that it remain unnoticed by the owner. Often there is a default trigger set in the banking website and transactions below say, Rs. 1000 withdrawal are not reported to the owner of the account. Withdrawing an amount of Rs. 1000 over some time will lead to a total withdrawal of a large sum.

18. Data Diddling

It is a practice of changing the data before it is entered into the computer system. Often the original data is retained after the execution of the data is done. For example, DA, or the basic salary of the person is changed in the payroll data of an individual for pay calculation. Once the salary is calculated and transferred to his account, the total salary is replaced by his actual salary in the report.

19. Email Spoofing

It is a process of changing the header information of an email so that its source is not identified and it appears to an individual at the receiving end that the email has originated from a source other than the source.

Author: Mikhail

No comments yet.

You must be logged in to leave a comment. Login here


Thread Back to Threads Thread

You May Also Like

If you can change the future then it is actually an intuition and not the future
Tags: Physics, Time Travel, Future, Intuition

As per the general understanding, the Future is a time that is yet to come. But when we talk about time travel to future, it is generally for knowing the future in advance or simply trying to change it on our own will. But does future holds it's title of being the future if we can change it?
Common Cyber Threats Every Business Should Know
Tags: Cyber Threats, Cyber Security, Cybersecurity, Hack

In today's digital landscape, businesses of all sizes face an increasing number of cyber threats. Cybercriminals continuously evolve their tactics to exploit vulnerabilities, making it crucial for organizations to stay informed and implement robust security measures.
What is Jaatkarma Sanskar?
Tags: New Born Care, Baby Care

In Ayurveda, Jaatkarma Sanskar refers to the actions that are to be taken immediately after the birth of a child. These are to be carried out simultaneously with the care of the post-partum mother.
What should be your next website?
Tags: Website, Tips

I have recently creayed new website. I want to make it as a guest post website properly on Real Estate niche. I want some tips regarding this niche.