Kinds of Cyber Crime
Kinds of Cyber Crime
Kinds of Cyber Crime
Cyber Stalking
It is an act of stalking, harassing or threatening someone using Internet/computer as a medium. This is
often done to defame a person and use email, social network, instant messenger, web-posting, etc. as a
using Internet as a medium as it offers anonymity. The behavior includes false accusations, threats, sexual
exploitation to minors, monitoring, etc.
Child Pornography
It is an act of possessing image or video of a minor (under 18), engaged in sexual conduct.
Cyber Terrorism
It is defined as the use of computer resources to intimidate or coerce government, the civilian population or
any segment thereof in furtherance of political or social objectives.
Phishing
It is a process of acquiring personal and sensitive information of an individual via email by disguising as a
trustworthy entity in an electronic communication. The purpose of phishing is identity theft and the personal
information like username, password, and credit card number etc. may be used to steal money from user
account. If a telephone is used as a medium for identity theft, it is known as Vishing (voice phishing).
Another form of phishing is Smishing, in which sms is used to lure customers.
Computer Vandalism
It is an act of physical destroying computing resources using physical force or malicious code.
Computer Hacking
It is a practice of modifying computer hardware and software to accomplish a goal outside the creator’s
original purpose. The purpose of hacking a computer system may vary from simply demonstrations of the
technical ability, to sealing, modifying or destroying information for social, economic or political reasons.
Now the corporate are hiring hackers, a person who is engaged in hacking computers, to intentionally hack
the computer of an organization to find and fix security vulnerabilities.
White Hat: white hat hackers are the persons who hack the system to find the security
vulnerabilities of a system and notify to the organizations so that a preventive action can be taken to
protect the system from outside hackers. White hat hackers may be paid employee of an
organization who is employed to find the security loop-holes, or may be a freelancer who just wants
to prove his mantle in this field. They are popular known as ethical hackers.
Black Hat: in contrast to the white hat, the black hat hack the system with ill intentions. They may
hack the system for social, political or economically motivated intentions. They find the security
loopholes the system, and keep the information themselves and exploit the system for personal or
organizational benefits till organization whose system is compromised is aware of this, and apply
security patches. They are popularly known as crackers.
Grey Hat: Grey hat hackers find out the security vulnerabilities and report to the site administrators
and offer the fix of the security bug for a consultancy fee.
Blue hat: A blue hat hacker is someone outside computer security consulting firms who is used to
bug-test a system prior to its launch, looking for exploits so they can be closed.
Spamming
Sending of unsolicited and commercial bulk message over the internet is known as spamming. An email
can be classified as spam, if it meets following criteria:
Mass mailing:- the email is not targeted to one particular person but to a large number of peoples.
Anonymity:- The real identify of the person not known
Unsolicited:- the email is neither expected nor requested for the recipient.
These spams not only irritate the recipients and overload the network but also waste the time and occupy
the valuable memory space of the mailbox.
Cyber Squatting
It is an act of reserving the domain names of someone else’s trademark with intent to sell it afterwards to
the organization who is the owner of the trademark at a higher price.
Logic Bombs
These are malicious code inserted into legitimate software. The malicious action is triggered by some
specific condition. If the conditions holds true in future, the malicious action begins and based on the action
defined in the malicious code, they either destroy the information stored in the system or make system
unusable.
Web Jacking
The hacker gain access to a website of an organization and either blocks it or modify it to serve political,
economical or social interest. The recent examples of web jacking are some of the websites of the
educational institutes were hacked by Pakistani hackers and an animation which contains Pakistani flags
were flashed in the homepage of these websites. Another example is Indian hackers hacked website of
Pakistani railways and flashed Indian flag in the homepage for several hours on the occasion of
Independence Day of India in 2014.
Salami Attack
It is an attack which proceeds with small increments and final add up to lead to a major attack. The
increments are so small that they remain unnoticed. An example of salami attack is gaining access to
online banking of an individual and withdrawing amount in such a small amounts that it remains unnoticed
by the owner. Often there is default trigger set in the banking website and transactions below say, Rs. 1000
withdrawal are not reported to the owner of the account. Withdrawing amount of Rs. 1000 over a period of
time will lead to total withdrawal of a large sum.
Data Diddling
It is a practice of changing the data before its entry into the computer system. Often, the original data is
retained after the execution on the data is done. For example, DA or the basic salary of the person is
changed in the payroll data of an individual for pay calculation. Once the salary is calculated and
transferred to his account, the total salary is replaced by his actual salary in the report.
Email Spoofing
It is a process of changing the header information of an e-mail so that its original source is not identified
and it appears to an individual at the receiving end that the email has been originated from source other
than the original source.