Types Of Cyber Crime




(A.)Hacking


In this type of crime persons' computer is accessed by criminals without the knowledge of a person from a remote location. Hacking is done to access the personal information, confidential or sensitive information from a person's computer. Hacking can also be done to change the password of the social networking like facebook, Instagram, twitter, snapchat , etc and misuse them or any other business transactions site and use the information against them.

(B.)Theft

When a person violates or breaks the copyrights of particular websites and download songs, videos, games, software, movies, etc. is known as theft. This is the pirated version there are many websites which allows downloading the data that is copied from other websites quality of this data is not up to mark.

(C.)Identity Theft
In this type of crime, criminals steal the data about person's bank account number, credit card number, pin and other confidential data to transfer the money to his account or buy things online by acting as an original person. This theft can result in huge economic loss of the victim.


(D.)Defamation

In this type of attack, the criminals hack the email account of the person and send mail using abusive language to know person's mail accounts so as to lower the dignity or fame of the person.

(E.)Malicious Software

These are the software or programs that are used to access the system to steal confidential data of the organization or this software can be used to damage the hardware and software of the system.

(F.)Cyber Stalking

This is the type of attack where online message and emails are bombarded on victim's system. In cyber stalking, the internet is used to harass an individual, group or organization by using defamation, identity theft, solicitation for sex, false accusations, etc.

(G.)E-mail Harassment 
In this type of attack, the victim is harassed by receiving letters, attachment in files and folders of emails.

(H.)Email Bombing

It involves sending a large number of emails to a victim, which can be an individual or a company which ultimately results in crashing.

(I.)Data Diddling
It is actually of raw of data before the computer processes it and then changing it back after the processing is completed. It may lead to huge losses for the organizations.


(J.)Salami Attack

It is a kind of cybercrime which is generally done to commit financial crimes. The key here is to make the alterations so insignificant that in a single case it would go completely unnoticed e.g.: A bank employees insert a program into the bank's server that deducts a small amount from the account of every customer.

(K.)Internet Time Theft

  • It is a kind of theft in which the internet surfing hours of the victims used by someone another person by gaining access to their ID and Password.



  • In this section, there are more types which I am not explaining here because I explain earlier like (spoofing, trojan horse, virus, phishing, logic bomb)


SHARE

Dron Patel

’Hi I am Dron Patel 3rd year computer engineering student. ’ I am passionate about ethical hacking’ Inspired to make things looks better.

    Dribble
  • Image
  • Image
  • Image
  • Image
  • Image
    Blogger Comment
    Facebook Comment

0 comments:

Post a Comment