SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Typology of Cyber
Crimes
 1: a doctrine of theological
types; especially : one holding that things in
Christian belief are prefigured or symbolized
by things in the OldTestament
 2: study of or analysis or classification based
on types or categories.
 Cybercrime is defined as a crime in which a computer
is the object of the crime (hacking, phishing,
spamming) or is used as a tool to commit an offense
(child pornography, hate crimes).
 Cybercriminals may use computer technology to
access personal information, business trade secrets,
or use the Internet for exploitive or malicious
purposes. Criminals can also use computers for
communication and document or data storage.
 Criminals who perform these illegal activities are
often referred to as hackers.
 Cybercrime may also be referred to as computer
crime.
Types of Cyber Crimes Can be Classified
into the Categories which we will see
further.
Cyber crimes are broadly categorized into three
categories, namely crime against
1. Individual
2. Property
3. Government
 This type of cyber crime can be in the form of:
1. Cyber stalking,
2. Distributing pornography,
3. Trafficking and Grooming.
Today, law enforcement agencies are
taking this category of cyber crime very
seriously and are joining forces
internationally to reach and arrest the
perpetrators.
 Just like in the real world where a criminal can steal
and rob, even in the cyber world criminals resort to
stealing and robbing.
 In this case, they can steal a person’s bank details and
siphon off money; misuse the credit card to make
numerous purchases online; run a scam to get naïve
people to part with their hard earned money; use
malicious software to gain access to an organization’s
website or disrupt the systems of the organization.
 The malicious software can also damage software and
hardware, just like vandals damage property in the
offline world.
 Although not as common as the other two
categories, crimes against a government are
referred to as cyber terrorism. If successful, this
category can wreak havoc and cause panic amongst
the civilian population.
 In this category, criminals hack government
websites, military websites or circulate propaganda.
 The perpetrators can be terrorist outfits or
unfriendly governments of other nations.
 It is important to note that a computer,
Internet or computer technology has to be
involved, and when the use of any of the
following techniques or activities is made to
carry out a crime or illegal activity – only then
can it be classified as a Cybercrime.
 This is a type of crime wherein a person’s
computer is broken into so that his personal or
sensitive information can be accessed.
 In the United States, hacking is classified as a
felony and punishable as such. This is different
from ethical hacking, which many organizations
use to check their Internet security protection.
 In hacking, the criminal uses a variety of
software to enter a person’s computer and the
person may not be aware that his computer is
being accessed from a remote location.
 This crime occurs when a person violates
copyrights and downloads music, movies,
games and software. There are even peer
sharing websites which encourage software
piracy and many of these websites are now
being targeted by the FBI. Today, the justice
system is addressing this cyber crime and
there are laws that prevent people from
illegal downloading.
A 44YEAR OLD
PUBLISHING
EXECUTIVE NAMED
CLAIRE MILLER WAS
HARASSED BY
STRANGERS WHO
WERE RESPONDING
TOVERGING-ON-
PORNOGRAPHIC
PROMISES
SOMEONE HAD
MADE IN HER NAME
ONLINE.THESE
POSTINGS
INCLUDED HER
HOME ADDRESS
ANDTELEPHONE
NUMBER
 This is a kind of online harassment
wherein the victim is subjected to a
barrage of online messages and
emails.
 Typically, these stalkers know their
victims and instead of resorting to
offline stalking, they use the
Internet to stalk.
 However, if they notice that cyber
stalking is not having the desired
effect, they begin offline stalking
along with cyber stalking to make
the victims’ lives more miserable.
 This has become a major problem with
people using the Internet for cash
transactions and banking services. In this
cyber crime, a criminal accesses data about a
person’s bank account, credit cards, Social
Security, debit card and other sensitive
information to siphon money or to buy things
online in the victim’s name. It can result in
major financial losses for the victim and even
spoil the victim’s credit history.
 These are Internet-based software or
programs that are used to disrupt a network.
The software is used to gain access to a
system to steal sensitive information or data
or causing damage to software present in the
system.
 This is also a type of cyber crime wherein
criminals solicit minors via chat rooms for the
purpose of child pornography. The FBI has
been spending a lot of time monitoring chat
rooms frequented by children with the hopes
of reducing and preventing child abuse and
soliciting.
 This is one of the detestable malware-based
attacks. Ransomware enters your computer
network and encrypts your files using public-
key encryption, and unlike other malware this
encryption key remains on the hacker’s
server. Attacked users are then asked to pay
huge ransoms to receive this private key.
 DDoS attacks are used to make an online service
unavailable and bring it down, by bombarding or
overwhelming it with traffic from multiple
locations and sources.
 Large networks of infected computers, called
Botnets are developed by planting malware on
the victim computers.
 The idea is normally to draw attention to the
DDOS attack, and allow the hacker to hack into
a system.
 Extortion and blackmail could be the other
motivations.
 Botnets are networks of compromised
computers, controlled by remote attackers in
order to perform such illicit tasks as sending
spam or attacking other computers.
 Computer Bots can also be used act like
malware and carry out malicious tasks. Then
can be used to assemble a network of
computers and then compromise them.
 Phishing is the act of attempting to acquire sensitive
information like usernames, passwords and credit card
details by disguising as a trustworthy source.
 Phishing is carried out through emails or by luring the
users to enter personal information through fake
websites.
 Criminals often use websites that have a look and feel of
some popular website, which makes the users feel safe to
enter their details there.
 Attacks are increasing, with financial services accounting
for over 93% of impersonated or hijacked brands through
bogus websites and emails. Almost all of the UK’s high
street banks have been affected by phishing.
 Vishing is the criminal practice of using social
engineering andVoice over IP (VoIP) to gain access to
private personal and financial information from the
public for the purpose of financial reward.
 The term is a combination of “Voice" and phishing.
 Vishing exploits the publics trust in landline telephone
services.
 Vishing is typically used to steal credit card numbers
or other information used in identity theft schemes
fromMonday, September 24, 2012 individuals.
VIRUS
 Viruses are programs that
attach themselves to a
computer or a file.
 They then circulate
themselves to other files
and to other computers on
a network.
WORMS
 Worms, unlike viruses do
not need the host to attach
themselves to.
 They merely make
functional copies of
themselves and do this
repeatedly till they eat up
all the available space on a
computer's memory.
 These attacks occur when a person or a group
of people try to prevent a internet site from
functioning effectively either temporarily or
on a long term basis.
 Apart from inculcating safe browsing
habits, maintain good system hygiene. Avoid
leaving Digital Footprints.
 You must secure your Windows system with a
fully updated operating system and installed
software, and ensure that you install a good
Internet Security Software to protect your
Windows computer.
 Using the Enhanced Mitigation Experience
Toolkit on Windows is a great way to protect
your system against zero-day attacks.
 Although it will not be possible to eliminate all
the Cyber crime from the world, because new
crimes keep cropping up every day, it is possible
to keep a check on them.
 History is the witness that no government has
succeeded in totally eliminating crime from the
globe.
 The only possible step is to make people aware
of their rights and duties, and further making the
application of the laws more stringent to check
crime
Stay safe …
it’s a bad world out there!
…Advocate Gaurav M Patel

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and conceptCyberspace jurisdiction meaning and concept
Cyberspace jurisdiction meaning and concept
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Hacking vs cracking
Hacking vs crackingHacking vs cracking
Hacking vs cracking
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Cyber crime in India PPT .pptx
Cyber crime in India PPT .pptxCyber crime in India PPT .pptx
Cyber crime in India PPT .pptx
 
Criminology ppt by_waseem_i._khan
Criminology ppt by_waseem_i._khanCriminology ppt by_waseem_i._khan
Criminology ppt by_waseem_i._khan
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Theft
TheftTheft
Theft
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Indian Penal Code
Indian Penal CodeIndian Penal Code
Indian Penal Code
 
Concept of crime
Concept of crimeConcept of crime
Concept of crime
 

Andere mochten auch

Cyber Bulling On School Grounds
Cyber Bulling On School GroundsCyber Bulling On School Grounds
Cyber Bulling On School Grounds
kerr1va
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
Asish Verma
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
june21harsh
 

Andere mochten auch (12)

Facebook Manual
Facebook ManualFacebook Manual
Facebook Manual
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Cyber bulling
Cyber bulling Cyber bulling
Cyber bulling
 
Cyber bulling
Cyber bullingCyber bulling
Cyber bulling
 
Cyber Bulling On School Grounds
Cyber Bulling On School GroundsCyber Bulling On School Grounds
Cyber Bulling On School Grounds
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare2015 Upload Campaigns Calendar - SlideShare
2015 Upload Campaigns Calendar - SlideShare
 
What to Upload to SlideShare
What to Upload to SlideShareWhat to Upload to SlideShare
What to Upload to SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Ähnlich wie Typology of Cyber Crime

Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 

Ähnlich wie Typology of Cyber Crime (20)

Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
cyber crime
cyber crimecyber crime
cyber crime
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 

Kürzlich hochgeladen

PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
ca2or2tx
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
E LSS
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
bd2c5966a56d
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
ShashankKumar441258
 

Kürzlich hochgeladen (20)

PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
Doctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddpptDoctrine of Part-Performance.ddddddddddppt
Doctrine of Part-Performance.ddddddddddppt
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
How do cyber crime lawyers in Mumbai collaborate with law enforcement agencie...
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptxAnalysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
Analysis of R V Kelkar's Criminal Procedure Code ppt- chapter 1 .pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptxIBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
IBC (Insolvency and Bankruptcy Code 2016)-IOD - PPT.pptx
 

Typology of Cyber Crime

  • 2.  1: a doctrine of theological types; especially : one holding that things in Christian belief are prefigured or symbolized by things in the OldTestament  2: study of or analysis or classification based on types or categories.
  • 3.  Cybercrime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes).  Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Criminals can also use computers for communication and document or data storage.  Criminals who perform these illegal activities are often referred to as hackers.  Cybercrime may also be referred to as computer crime.
  • 4. Types of Cyber Crimes Can be Classified into the Categories which we will see further.
  • 5. Cyber crimes are broadly categorized into three categories, namely crime against 1. Individual 2. Property 3. Government
  • 6.  This type of cyber crime can be in the form of: 1. Cyber stalking, 2. Distributing pornography, 3. Trafficking and Grooming. Today, law enforcement agencies are taking this category of cyber crime very seriously and are joining forces internationally to reach and arrest the perpetrators.
  • 7.  Just like in the real world where a criminal can steal and rob, even in the cyber world criminals resort to stealing and robbing.  In this case, they can steal a person’s bank details and siphon off money; misuse the credit card to make numerous purchases online; run a scam to get naïve people to part with their hard earned money; use malicious software to gain access to an organization’s website or disrupt the systems of the organization.  The malicious software can also damage software and hardware, just like vandals damage property in the offline world.
  • 8.  Although not as common as the other two categories, crimes against a government are referred to as cyber terrorism. If successful, this category can wreak havoc and cause panic amongst the civilian population.  In this category, criminals hack government websites, military websites or circulate propaganda.  The perpetrators can be terrorist outfits or unfriendly governments of other nations.
  • 9.  It is important to note that a computer, Internet or computer technology has to be involved, and when the use of any of the following techniques or activities is made to carry out a crime or illegal activity – only then can it be classified as a Cybercrime.
  • 10.  This is a type of crime wherein a person’s computer is broken into so that his personal or sensitive information can be accessed.  In the United States, hacking is classified as a felony and punishable as such. This is different from ethical hacking, which many organizations use to check their Internet security protection.  In hacking, the criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location.
  • 11.  This crime occurs when a person violates copyrights and downloads music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI. Today, the justice system is addressing this cyber crime and there are laws that prevent people from illegal downloading.
  • 12. A 44YEAR OLD PUBLISHING EXECUTIVE NAMED CLAIRE MILLER WAS HARASSED BY STRANGERS WHO WERE RESPONDING TOVERGING-ON- PORNOGRAPHIC PROMISES SOMEONE HAD MADE IN HER NAME ONLINE.THESE POSTINGS INCLUDED HER HOME ADDRESS ANDTELEPHONE NUMBER  This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails.  Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk.  However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims’ lives more miserable.
  • 13.  This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history.
  • 14.  These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system.
  • 15.  This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography. The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting.
  • 16.  This is one of the detestable malware-based attacks. Ransomware enters your computer network and encrypts your files using public- key encryption, and unlike other malware this encryption key remains on the hacker’s server. Attacked users are then asked to pay huge ransoms to receive this private key.
  • 17.  DDoS attacks are used to make an online service unavailable and bring it down, by bombarding or overwhelming it with traffic from multiple locations and sources.  Large networks of infected computers, called Botnets are developed by planting malware on the victim computers.  The idea is normally to draw attention to the DDOS attack, and allow the hacker to hack into a system.  Extortion and blackmail could be the other motivations.
  • 18.  Botnets are networks of compromised computers, controlled by remote attackers in order to perform such illicit tasks as sending spam or attacking other computers.  Computer Bots can also be used act like malware and carry out malicious tasks. Then can be used to assemble a network of computers and then compromise them.
  • 19.  Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source.  Phishing is carried out through emails or by luring the users to enter personal information through fake websites.  Criminals often use websites that have a look and feel of some popular website, which makes the users feel safe to enter their details there.  Attacks are increasing, with financial services accounting for over 93% of impersonated or hijacked brands through bogus websites and emails. Almost all of the UK’s high street banks have been affected by phishing.
  • 20.  Vishing is the criminal practice of using social engineering andVoice over IP (VoIP) to gain access to private personal and financial information from the public for the purpose of financial reward.  The term is a combination of “Voice" and phishing.  Vishing exploits the publics trust in landline telephone services.  Vishing is typically used to steal credit card numbers or other information used in identity theft schemes fromMonday, September 24, 2012 individuals.
  • 21. VIRUS  Viruses are programs that attach themselves to a computer or a file.  They then circulate themselves to other files and to other computers on a network. WORMS  Worms, unlike viruses do not need the host to attach themselves to.  They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.
  • 22.  These attacks occur when a person or a group of people try to prevent a internet site from functioning effectively either temporarily or on a long term basis.
  • 23.  Apart from inculcating safe browsing habits, maintain good system hygiene. Avoid leaving Digital Footprints.  You must secure your Windows system with a fully updated operating system and installed software, and ensure that you install a good Internet Security Software to protect your Windows computer.  Using the Enhanced Mitigation Experience Toolkit on Windows is a great way to protect your system against zero-day attacks.
  • 24.  Although it will not be possible to eliminate all the Cyber crime from the world, because new crimes keep cropping up every day, it is possible to keep a check on them.  History is the witness that no government has succeeded in totally eliminating crime from the globe.  The only possible step is to make people aware of their rights and duties, and further making the application of the laws more stringent to check crime
  • 25. Stay safe … it’s a bad world out there! …Advocate Gaurav M Patel