In our previous blogs we havetalked about condition of
cyber security in India and some of the polices that government has designed to
decrease the rate of cyber crime in India.
In this blog we will be discussion about different
types of
cyber crime which are most common
in India.
Cyber Crimes can be categorized in two ways:
1. The crimes in which the computer is the target. Examples of such crimes are
hacking, virus attacks, DOS attack etc.
2. The crime sin which the computer is used as a weapon. These types of crimes
include cyber terrorism, IPR violations, credit card frauds, EFT frauds,
pornography etc.
DIFFERENT KINDS OF CYBER CRIMES ARE FOLLOWING
1.Unauthorized Access and Hacking:
Unauthorized access means any kind of access without the permission of either
of the rightful or person in charge of the computer, computer system or
computer network. Hacking means an illegal intrusion into a computer system
and/or network. Every act committed towards breaking into a computer and/or
network is hacking. Hackers write or use ready-made computer programs to attack
the target computer. They possess the desire to destruct and they get the kick
out of such destruction. Some hackers hack for personal monetary gains, such as
to stealing the credit card information, transferring money from various bank
accounts to their own account followed by withdrawal of money. Government
websites are the most targeted sites for the hackers.
![]() |
SOURCE: GOOGLE |
2. Web Hijacking:
Web hijacking means taking forceful control of another person’s website. In
this case the owner of the website loses control over his website and its
content.
![]() |
SOURCE: GOOGLE |
3.Pornography:
Pornography means showing sexual acts in order to cause sexual excitement. The definition of pornography also includes pornographic websites, pornographic magazines produced using computer and the internet pornography delivered over mobile phones.
![]() |
SOURCE: GOOGLE |
4. Child Pornography:
The Internet is being highly used as a medium to sexually abuse children. The
children are viable victim to the cyber crime. Computers and internet having
become a necessity of every household, the children have got an easy access to
the internet. There is an easy access to the pornographic contents on the
internet. Pedophiles lure the children by distributing pornographic material
and then they try to meet them for sex or to take their nude photographs
including their engagement in sexual positions. Sometimes Pedophiles contact
children in the chat rooms posing as teenagers or a child of similar age and
then they start becoming friendlier with them and win their confidence. Then
slowly pedophiles start sexual chat to help children shed their inhibitions
about sex and then call them out for personal interaction. Then starts actual
exploitation of the children by offering them some money or falsely promising
them good opportunities in life. The pedophiles then sexually exploit the
children either by using them as sexual objects or by taking their pornographic
pictures in order to sell those over the internet.
![]() |
SOURCE: TNS WORLD |
5.Cyber Stalking:
In general terms, stalking can be termed as the repeated acts of harassment targeting the victim such as following the victim, making harassing phone calls, killing the victims pet, vandalizing victims property, leaving written messages or objects. Stalking may be followed by serious violent acts such as physical harm to the victim. Cyber Stalking means repeated acts of harassment or threatening behavior of the cyber criminal towards the victim by using internet services. Both kind of Stalkers i.e., Online & Offline – have desire to control the victims life.
![]() |
SOURCE :GOOGLE |
6. Denial of service Attack:
This is an attack in which the criminal floods the bandwidth of the victim’s
network or fills his e-mail box with spam mail depriving him of the services he
is entitled to access or provide. This kind of attack is designed to bring the
network to crash by flooding it with useless traffic. Another variation to a
typical denial of service attack is known as a Distributed Denial of Service
(DDoS) attack wherein the perpetrators are many and are geographically
widespread. Many DoS attacks, such as the Ping of Death and Teardrop attacks,
exploit limitations in the TCp/IP protocols. For all known DoS attacks, there
are software fixes that system administrators can install to limit the damage
caused by the attacks. But, like Virus, new DoS attacks are constantly being
dreamed up by Hacker.
![]() |
SOURCE :GOOGLE |
Nice and informative
ReplyDeleteUseful info.
ReplyDeleteThanks
DeleteInformative
ReplyDeletevery informative
ReplyDeleteBahut hi achchi information Di good ๐๐๐๐
ReplyDeleteInformative content๐
ReplyDeleteVery effective and useful content
ReplyDeleteGood initiative, most of the social media user don't know about cyber crimes.
ReplyDeleteyes, Indeed
DeleteThnkyou for such useful information .. big fan sir
ReplyDeleteThanks for the appreciation
DeleteNice sir ji mzza aagya pdhkr✌️✌️
ReplyDeleteAmazing content๐
ReplyDeleteNice
ReplyDelete