[sg_popup id=”1345″ event=”inherit”][/sg_popup]Types of Cyber Crimes for University Assistant/ High Court Assistant Exams
1. Phishing
Attempt to obtain sensitive information such as usernames, passwords, & credit card details
Carried out by email spoofing or instant messages
Tabnabbing,Tabjacking, vishing & smishing
Section 66,66A, 66 B,66 C & 66 D of IT Act
2. Unauthorized access & hacking
- Any access without permission
- Hacking: breaking in to a computer & network
–Use ready made programs or write programs to attack
–For stealing credit card information etc
3. Web Hijacking
- Hacking web server
- Take control on another person’s website
4. Trojan Attack
- Programs act like useful but damping
- Two parts
–Client part & server part
5. Virus & worm attack
- Virus:
–Program infect othoer programs
–Make copies & spread in to other programs
- Worms:
–Programs that multiply like viruses but spread from computer to computer
–Through networks
6. Email spoofing
- email that appears to have been originated from one source when it was actually sent from another source
7. Email Spamming
- Sending emails to thousands & thousands users
- Like a chain letter
8. Sending Malicious codes through email
- Viruses, trojans etc sent throgh emails
–As an attachment
–Or a link of website which on visiting, downloads a malicious code
9. Email Bombing
- Repeatedly sending an identical message to a particular address
10. Forgery
- Forging of Counterfeit currency notes ,postage & revenue stamps, mark sheets etc
- Impersonate another person
11. IPR Violations
- Software piracy
- Copyright infringement
- Trademark violations
- Theft of computer source code
- Patent violations etc
12. Cyber Terrorism
- Targeted attacks on
–Military installations
–Power plants
–Air traffic control
–Banks
–Rail traffic control
–Telecommunication networks
–Police
–Medical
–Fire & rescue systems etc
- Can be conducted remotely
13. Cyber Stalking
Following a person’s movements across the internet
By posting messages on the boards frequented by the victim
Entering the chat rooms frequented by the victim
Constantly bombarding emails to the victim
Section 72 of IT act is used for regulating
14. Identity Theft
Some one appropriates another’s personal information with out their knowledge
To commit theft or fraud
15. Cyber Extortion
Attack or threat of attack demanding money to stop the attack
When hackers threatens or attacks a server , a website or a computer system using DOS attack : the system is under cyber extortion
16. Cyber Warfare
Actions by a nation to penetrate another nation’s computers or networks
For causing damage or disruption
Can be cyber espionage
Obtain secrets critical to a nation’s security
Disrupting transport / communication by exploting computer systems or satellite technology
17. Salami Slicing/ Salami attack
- Anything cut in to small actions or fractions
Eg: electronic transfer of money
18. Software piracy
- Unauthorized use & distribution of computer software
19. Cyber pornography
- Using cyberspace to create , display, distribute, import or publish pornography or obscene materials
20. Distributed DOS
- Denial of service (DOS)
- Using internet to break in to computers & using them to attack a network
You can watch my Unacademy lessons here