0% found this document useful (0 votes)
43 views14 pages

Wa0075

The document discusses various types of cyber crimes including hacking, identity theft, cyber stalking, web hijacking, pornography, denial of service attacks, malicious software, financial crimes, intellectual property crimes, email crimes, cyber defamation, cyber terrorism, and cyber theft. It provides details on each type of cyber crime, examples, and classifications.

Uploaded by

Aromal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views14 pages

Wa0075

The document discusses various types of cyber crimes including hacking, identity theft, cyber stalking, web hijacking, pornography, denial of service attacks, malicious software, financial crimes, intellectual property crimes, email crimes, cyber defamation, cyber terrorism, and cyber theft. It provides details on each type of cyber crime, examples, and classifications.

Uploaded by

Aromal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

CYBER CRIMES

MODULE 5
Cyber Crime (15 Marks 2021)

Cyber Crime is defined as, "a crime in which a computer is


the object of the crime or is used as a tool to commit an
offence".
Common types of cyber crime include online bank
information theft, identity theft, online predatory crimes and
unauthorised computer access.
With the advancement of technology, cyber crimes have
also increased.
The primary source of Cyber law in India is the Information
Technology Act, 2000.
Classifications of Cyber Crimes (4 Marks 2022)

1. Crimes where a computer system itself is the target such as hacking,


dissemination of viruses, and denial of service attacks
2. Traditional crimes like fraud, theft, and child pornography that are
facilitated and enabled by a computer
i. theft of money, financial instruments, property, services, or
valuable data
ii. unauthorized access to computer time
iii. illegal use of computer programs
iv. unauthorized acquisition of stored data
Cyber terrorism (1 Marks 2022)

Cyber terrorism refers to the convergence of cyberspace and terrorism


and it covers politically motivated hacking operations intended to cause
grave harm such as loss of life or severe economic damage. It is the use
of cyber space to cause harm to the general public and disrupt the
integrity and sovereignty of the target country.

If these acts cause injuries to persons, cause to death of any person,


damage or disrupt any property, cause disruption of essential supplies or
services or negatively affect the critical information structure, they
become punishable acts.
Scope of Cyber Terrorism

Unlawful attacks and threats of attack against computers,


networks, and the information stored therein are the major
weapons used by terrorists with the view to force a
government or public in furtherance of their objectives are
generally covered under cyber terrorism. Targets may
include power plants, military installations, the banking
industry, air traffic control centres, water systems etc.

Cyber Warfare is also form of Cyber terrorism. Cyber


warfare is the conduct of military operations by virtual
means.
Categories of Cyber Crimes
Cyber crimes are broadly classified under 4 heads

1. Crime against individuals: Crime against individual is committed against


person using electronic domain. It includes child pornography, harassment,
hacking, financial crimes, etc. The potential harm of such a crime can hardly
be higher.

2. Cyber Crime against property: Cyber crime against property is committed


using an electronic device as a medium. Here, the property does not mean any
immovable property but includes movable and intangible property like
computers. Intellectual Property, etc.

3. Cyber crime against Government: A cyber crime against a government is


committed to threatening the unity, honour, and security of the target country.
The criminals hack government websites and military websites for achieving
their target. Cyber crime against government includes Cyber warfare, cyber
Terrorism etc.

4. Cyber crime against society: When a cyber crime is committed against


numerous individuals, it is known as cyber crime against society. It includes
Online Gambling. Cyber Trafficking, Web jacking, Salami attacks etc.
Types of Cyber Crimes

1. Hacking (4 Marks 2022)


Hacking is a process of getting illegal access to a device that may include a
mobile phone, computer, networks, social media accounts, or other authorized
accounts. The person who does hacking is known as a Hacker. (1 Marks 2021)

Types of Hackers (2 Marks 2021)

i. The white hat hacker: The white hat hacker does not carry on any illegal
activities. He only learns about various information systems and seeks
their vulnerabilities inorder to provide security programs that protect the
system from illegal penetration. He uses his skill for good things and do
not harm the computer.

ii. The black hat hacker: The black hat hacker carries on illegal activities
associated with computer crimes. He gains unauthorised access to a
computer with malicious intention for private gain.

iii. The grey hat hacker: The grey hat hacker is a hackers who is a
combination of white hat hacker and the black hat hacker.
2. Identity Theft
This has become a major problem with people using the internet for cash
transactions and banking services. In this cybercrime, a criminal accesses data
about a person's bank account, credit cards, debit card and other sensitive
information to take money or to buy things online in the victim's name. It can
result in major financial losses for the victim .
The identity theft may be either through Phishing or Pharming

a. Phishing: Phishing is a type of identity theft where the victims are contacted
by email, telephone or text message by someone posing as a legitimate institution
to attract individuals into providing sensitive data such as personally identifiable
information, banking and credit card details, and passwords.

b. Pharming: Under pharming, a hacker infiltrates a computer system and


installs malicious code that causes website traffic from the system to be redirected
to bogus sites developed by the hacker with the intention of stealing a victim's
personal information. Phishing lures victims through fictitious emails to get them
to visit bogus sites and reveal their sensitive information, but in Pharming there is
absence of lure. This is done without the victim's knowledge or consent
(Pharming -2 Marks 2021)
3. Cyber Stalking

Cyber stalking refers to repeated acts of harassment by using the internet,


email, or other types of electronic communications to stalk, harass, threaten,
manipulate, control, intimidate, frighten, embarrass or humiliate a person or
business of another person.

4. Web Hijacking

Web Hijacking refers to taking forceful control over a person's website and
thereby denying the owner's control over his website. Usually the hijacker
forcefully gains access over others website by cracking the password.

5. Pornography

Pornography is the act of using cyber space as a medium for creating,


distributing, imparting, publishing, describing or showing sexual acts or obscene
materials through pornographic websites, magazines or over mobile phones, in
order to cause sexual excitement or erotic feelings.
Child Pornography can be classified as one of the most serious forms of
cybercrime in India. It is defined as any visual depiction of sexually explicit
conduct involving a minor.
6. Denial of service attack

In this type of attack, the victim's network is flooding with unnecessary traffic or
filling the victim's e-mail box with spam mail. Such an attack is made to prevent
legitimate use of computer networks, to deprive a person from accessing service
or to disrupt connection between computers.

7. Malicious software

It is also called Malware. Malicious software is internet based software, which are
designed to disrupt a network or harm the computer. It includes virus, worms.
Trojen Horse, Spyware, Adware and other malicious programs.

Viruses are the programs that have the capability to infect other programs and
make copies itself and spread into other programs.

Worms are programs that multiply like viruses but spread from computer to
computer.
Trojen Horse is a computer program that pretends to be having a set of
useful or desirable features, but which later on gains control over the
computer and causes damages to the computer.

Spyware is a malicious software which is installed unknowingly without


appropriate user permissions while installing another program, which aims to
steal personal or organizational information like email address, passwords,
credit card number, etc..

Adware is a form of malicious software containing advertisements which


collects information about the user, inorder to display the advertisements in
the web browser.

8. Financial Crimes

Financial crimes may involve additional criminal acts, such as, computer
crime, elder abuse, burglary, armed robbery and even violent crimes such as
robbery or murder. These types of crimes may be carried out by individuals,
corporations, or by organised crime groups.
Ex- Salami Attack, Online gambling etc.
9. Intellectual Property Crimes

Intellectual property crimes is committed when someone manufactures, sells or


distribute counterfeit or pirated goods, such as patents, trademarks, industrial
designs or literary and artistic works for commercial gains.

10. E-mail crimes

a. E-mail frauds: It is the intentional deception of sending email for personal


gain or to damage another individual.

b. E-mail Spoofing: It refers to e-mail that appears to have originated from one
source but actually has been send from another source.

c. E-mail Bombing: It refers to sending a large number of e-mails to the


victim's account resulting in crashing of that account.

d. E-mail Spamming: It refers to sending thousands of e-mails to many users,


thereby flooding the internet from an unidentifiable source.
11. Cyber Defamation

If any one publishes defamatory matter about someone else on a website or send
e-mails containing defamatory statements to lower his reputation, it is called
cyber defamation.

12.Cyber Terrorism

Cyber terrorism is the act of Internet terrorism in terrorist activities, including


acts of deliberate, large-scale disruption of computer networks, especially of
personal computers attached to the internet by means of tools such as computer
viruses.
13. Cyber Theft

It is the act of using the internet to steal some ones information or to interfere
with some one or breaking and entering into others computer system for
committing cyber crimes. Certain types of Cyber theft are the following:

a. Internet time theft: It refers to usage by an unauthorized person to the


internet hours paid by another person.

b. Theft of computer system: This type of offence involves theft of computer or


parts of a computer or a peripheral attached to a computer.

c. Cyber Vandalism: It refers to damaging or destroying data rather than


stealing or misusing them.

You might also like