Hi frenz lets we have a knowledge on types of cybercrime. As a cyberlaw student we should have a knowledge on it.
Types of Cybercrime
• HACKING
• DENIAL OF SERVICE
ATTACK
• VIRUS DISSEMINATION
• SOFTWARE PIRACY
• PORNOGRAPHY
• IRC Crime
• CREDIT CARD FRAUD
• PHISHING
• SPOOFING
• CYBER STALKING
• CYBER
DEFAMATION
• THREATENING
• SALAMI ATTACK
• NET EXTORTION
HACKING
The act of gaining unauthorized access to a computer system or network and in some cases making unauthorized use of this access. Hacking is also the act by which other forms of cyber-crime (e.g., fraud, terrorism, etc.) are committed. Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user.
DENIAL OF SERVICE ATTACK
This is an act by the criminal, who floods the band width of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.
VIRUS DISSEMINATION
Malicious software that attaches iitself to other software.
(virus, worms, Trojan Horse, Time bomb,Logic Bomb, Rabbit and Bacterium are the malicious soft wares)
SOFTWARE PIRACY
Theft of software through the iillegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Retail revenue losses world wide are ever increasing due to this crime
Can be done in various ways such as end user copying, hard disk loading, Counterfeiting, Illegal downloads from the iinternet etc.
PRONOGRAPHY
Pornography is the first consistently successful ecommerce product. It was a
deceptive marketing tactics and mouse trapping technologies. Pronography encourage customers to access their websites. Anybody including children can log on to the internet and access website with pronography contents with a click of a mouse.
IRC CRIME
Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other Criminals use it for meeting coconspirators. Hackers use it for discussing their exploits / sharing the techniques
Paedophiles use chat rooms to allure small children.
CREDIT CARD FRAUD
You siimply have to type credit card number into www page off the vendor for
online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
NET EXTORTION
Copying the company’s confidential data in order to extort said company for huge amount.
PHISHING
It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means.
Spoofiing
Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges ,, so as to obtain access to the other computers on the network.
CYBER STALKING
The Criminal follows the victim by sending emails, entering the chat rooms frequently.
CYBER DEFAMATION
The Criminal sends emails containing defamatory matters to all concerned of the victim or post the defamatory matters on a website. (disgruntled employee may do this against boss, ex-boys friend against girl, divorced husband against wife etc)
THREATENING
The Criminal sends threatening email or comes in contact in chat rooms with
victim. (Any one disgruntled may do this against boss, friend or official)
SALAMI ATTACK
In such crime criminal makes insignificant changes in such a manner that such changes
would go unnoticed. Criminal makes such program that deducts small amount like 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
http//cybercelimumbai.com/files
posted by Renuka a/p Jeyabalan
Subscribe to:
Post Comments (Atom)
hye..thanks renu..good info bout cyber crimes...now only i know tat got alot of cyber crimes tat happening around us..:)
ReplyDeleteThis comment has been removed by the author.
ReplyDeletefuhyooo...there are lots of cyber crimes in the list, we really need to be careful...
ReplyDeleteYes Hidayat we should be aware of this kind of cyber crime to make sure that we do not fall victim on it.
ReplyDeletethe crimes have interesting and sometimes funny names. :)
ReplyDeleteyeah, nn!
ReplyDeletei'm sure u meant "salami attack" when u said tat. :P
Oh my god! Cyber crimes are really hectic....
ReplyDeletethank you so much.... the data helped me a lot in my law project! thanks again.
ReplyDeletegud matter
ReplyDeletegood.....
ReplyDeleteNice, it simple and clear
ReplyDeleteSo do you mind if I use some in my assignments?
thank you. this really helped me in my thesis.
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteavoid using unsecure computers guys
ReplyDeletethanks a lot about that..this indirectly helped me to do my work =]
ReplyDeletei have a doubt , if some one sends abussive sms to sum1 would it also cum under cyber crime ??
ReplyDeletethank u renuka di for dis awesome info its really very helpful for me too making ma presentation :)
ReplyDeletepliz do help me know strategies that may be employed to prevent and control these cyber crimes
ReplyDeletemy email please is neshbundi@yahoo.com or neshbundi1@gmail.com
Deletehey i want a report in problem in cyber crime investigation if u have.. plz help me my mail id is agrawal.arpita.1910@gmail.com
ReplyDeletetks very much . its really gonna help me n my cyber law exam today . wish me luck :)
ReplyDeleteThank you very much for nice explanation. Hope people will take care and will be saved from
ReplyDeleteCyber Crime in india, i guess people should be more educated on cyber crime subject.
Nice blog found here, thank you very much for cyber crimes blog .
ReplyDeleteCyber Crime
Cyber security
Cybercrime
cyber security
awesome post I am glad to be here and read this post is really nice thanks
ReplyDeletenyaa mirror proxy
1337x mirror proxy
kickass mirror proxy
idope mirror proxy
In today's digital landscape, understanding the many sorts of cybercrime is critical. This detailed review illuminates the various types of cyber risks that individuals and organizations encounter on a regular basis.; Every sort of Cyber Crimes Attorney covered in this article, from phishing schemes to ransomware assaults, underlines the need for enhanced cybersecurity measures. It's frightening how quickly cybercriminals adapt and modify their methods, making it critical for everyone to keep aware and attentive.
ReplyDelete