[sg_popup id=”1345″ event=”inherit”][/sg_popup]Types of Cyber Crimes
1.Phishing
2.Unauthorized access & hacking
3.Web Hijacking
4.Trojan attack
5.Virus & worm attack
6.Email spoofing
7.Email Spamming
8.Sending Malicious codes throgh email
9.Email Bombing
10.Forgery
11.IPR violations
12.Cyber Terrorism
13.Cyber stalking
14.Identity Theft
15.Cyber Extortion
16.Cyber warfare
17.Salami attack
18.Software piracy
19.Cyber pornography
20.Distributed DOS
21.Denial of Service
22.Leapfrog attack
23.Nigerian 419
24.Banking/Credit card related crimes
25.Dumster Diving
26.E commerce/ Investment frauds
27.Sale of illegal articles
28.Defamation
29.Cyber Squatting
30.Online Gambling
31.Data diddling
32.Theft of Internet hours
33.Theft of Computer system
1. Phishing
- Attempt to obtain sensitive information such as usernames, passwords, & credit card details
- Carried out by email spoofing or instant messages
- variants of phishing: Tabnabbing,Tabjacking, vishing & smishing
- Section 66,66A, 66 B,66 C & 66 D of IT Act
2. Unauthorized access & hacking
- Any access without permission
- Hacking: breaking in to a computer & network
–Use ready made programs or write programs to attack
–For stealing credit card information etc
3. Web Hijacking
- Hacking web server
- Take control on another person’s website
4. Trojan Attack
- Programs act like useful but damping
- Two parts
–Client part & server part
5. Virus & worm attack
- Virus:
–Program infect othoer programs
–Make copies & spread in to other programs
- Worms:
–Programs that multiply like viruses but spread from computer to computer
–Through networks
6. Email spoofing
- email that appears to have been originated from one source when it was actually sent from another source
7. Email Spamming
- Sending emails to thousands & thousands users
- Like a chain letter
8. Sending Malicious codes through email
- Viruses, trojans etc sent throgh emails
–As an attachment
–Or a link of website which on visiting, downloads a malicious code
9. Email Bombing
- Repeatedly sending an identical message to a particular address
10. Forgery
- Forging of Counterfeit currency notes ,postage & revenue stamps, mark sheets etc
- Impersonate another person
11. IPR Violations
- Software piracy
- Copyright infringement
- Trademark violations
- Theft of computer source code
- Patent violations etc
12. Cyber Terrorism
- Targeted attacks on
–Military installations
–Power plants
–Air traffic control
–Banks
–Rail traffic control
–Telecommunication networks
–Police
–Medical
–Fire & rescue systems etc
- Can be conducted remotely
13. Cyber Stalking
- Following a person’s movements across the internet
- By posting messages on the boards frequented by the victim
- Entering the chat rooms frequented by the victim
- Constantly bombarding emails to the victim
- Section 72 of IT act is used for regulating
14. Identity Theft
- Some one appropriates another’s personal information with out their knowledge
- To commit theft or fraud
15. Cyber Extortion
- Attack or threat of attack demanding money to stop the attack
- When hackers threatens or attacks a server , a website or a computer system using DOS attack : the system is under cyber extortion
16. Cyber Warfare
- Actions by a nation to penetrate another nation’s computers or networks
- For causing damage or disruption
- Can be cyber espionage
- Obtain secrets critical to a nation’s security
- Disrupting transport / communication by exploting computer systems or satellite technology
17. Salami Slicing/ Salami attack
- Anything cut in to small actions or fractions
Eg: electronic transfer of money
18. Software piracy
- Unauthorized use & distribution of computer software
19. Cyber pornography
- Using cyberspace to create , display, distribute, import or publish pornography or obscene materials
20. Distributed DOS
- Denial of service (DOS)
- Using internet to break in to computers & using them to attack a network
to watch the video lesson on this topic click on the links below.
download the pdf of Latest who is who in India here
you can download the pdf of all study materials here
You can watch the video lessons from here
please subscribe through mail to get more useful study materials
please share to your friends
Thank you
Bibi Mohanan