Types of Cyber Crimes for University Assistant/ High Court Assistant Exams

0
243

[sg_popup id=”1345″ event=”inherit”][/sg_popup]Types of Cyber Crimes for University Assistant/ High Court Assistant Exams

1. Phishing

Attempt to obtain sensitive information such as usernames, passwords,  & credit card details

Carried out by email spoofing or instant messages

Tabnabbing,Tabjacking, vishing & smishing

Section 66,66A, 66 B,66 C & 66 D of IT Act

2. Unauthorized access & hacking

  • Any access without permission
  • Hacking: breaking in to a computer & network

–Use ready made programs or write programs to attack

–For stealing credit card information etc

3. Web Hijacking

  • Hacking web server
  • Take control on another person’s website

4. Trojan Attack

  • Programs act like useful but damping
  • Two parts

–Client part & server part

5. Virus & worm attack

  • Virus:

–Program infect othoer programs

–Make copies &  spread in to other programs

  • Worms:

–Programs that multiply like viruses but spread from computer to computer

–Through networks

6. Email spoofing

  • email that appears to have been originated from one source when it was actually sent from another source

7. Email Spamming

  • Sending emails to thousands & thousands users
  • Like a chain letter

8. Sending Malicious codes through email

  • Viruses, trojans etc sent throgh emails

–As an attachment

–Or a link of website which on visiting, downloads a malicious code

9. Email Bombing

  • Repeatedly sending an identical message to a particular address

10. Forgery

  • Forging of Counterfeit currency notes ,postage & revenue stamps, mark sheets etc
  • Impersonate another person

11. IPR Violations

  • Software piracy
  • Copyright infringement
  • Trademark violations
  • Theft of computer source code
  • Patent violations etc

12. Cyber Terrorism

  • Targeted attacks on

–Military installations

–Power plants

–Air traffic control

–Banks

–Rail traffic control

–Telecommunication networks

–Police

–Medical

–Fire & rescue systems etc

  • Can be conducted remotely

13.  Cyber Stalking

Following a person’s movements across the internet

By posting messages on the boards frequented by the victim

Entering the chat rooms frequented by the victim

Constantly bombarding emails to the victim

Section 72 of IT act is used for regulating

14. Identity Theft

Some one appropriates another’s personal information with out their knowledge

To commit theft or fraud

15. Cyber Extortion

Attack or threat of attack demanding money to stop the attack

When hackers threatens or attacks a server , a website or a computer system using DOS attack : the system is under cyber extortion

16. Cyber Warfare

Actions by a nation to penetrate another nation’s computers or networks

For causing damage or disruption

Can be cyber espionage

Obtain secrets critical to a nation’s security

Disrupting transport / communication by exploting computer systems or satellite technology

17. Salami Slicing/ Salami attack

  • Anything cut in to small actions or fractions

Eg: electronic transfer of money

18. Software piracy

  • Unauthorized use & distribution of computer software

19. Cyber pornography

  • Using cyberspace to create , display, distribute, import or publish pornography or obscene materials

20. Distributed DOS

  • Denial of service (DOS)
  • Using internet to break in to computers & using them to attack a network

 

You can watch my Unacademy lessons here

Class 1

Class 2

 

 

 

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.