Types of Cyber Crimes- IT and cyber law for Kerala PSC Exams

[sg_popup id=”1345″ event=”inherit”][/sg_popup]Types of Cyber Crimes

 

1.Phishing

2.Unauthorized access & hacking

3.Web Hijacking

4.Trojan attack

5.Virus & worm attack

6.Email spoofing

7.Email Spamming

8.Sending Malicious codes throgh email

9.Email Bombing

10.Forgery

11.IPR violations

12.Cyber Terrorism

13.Cyber stalking

14.Identity Theft

15.Cyber Extortion

16.Cyber warfare

17.Salami attack

18.Software piracy

19.Cyber pornography

20.Distributed DOS

21.Denial of Service

22.Leapfrog attack

23.Nigerian 419

24.Banking/Credit card related crimes

25.Dumster Diving

26.E commerce/ Investment frauds

27.Sale of illegal articles

28.Defamation

29.Cyber Squatting

30.Online Gambling

31.Data diddling

32.Theft of Internet hours

33.Theft of Computer system

1. Phishing

  • Attempt to obtain sensitive information such as usernames, passwords,  & credit card details
  • Carried out by email spoofing or instant messages
  • variants of phishing: Tabnabbing,Tabjacking, vishing & smishing
  • Section 66,66A, 66 B,66 C & 66 D of IT Act

2. Unauthorized access & hacking

  • Any access without permission
  • Hacking: breaking in to a computer & network

–Use ready made programs or write programs to attack

–For stealing credit card information etc

3. Web Hijacking

  • Hacking web server
  • Take control on another person’s website

4. Trojan Attack

  • Programs act like useful but damping
  • Two parts

–Client part & server part

5. Virus & worm attack

  • Virus:

–Program infect othoer programs

–Make copies &  spread in to other programs

  • Worms:

–Programs that multiply like viruses but spread from computer to computer

–Through networks

6. Email spoofing

  • email that appears to have been originated from one source when it was actually sent from another source

7. Email Spamming

  • Sending emails to thousands & thousands users
  • Like a chain letter

8. Sending Malicious codes through email

  • Viruses, trojans etc sent throgh emails

–As an attachment

–Or a link of website which on visiting, downloads a malicious code

9. Email Bombing

  • Repeatedly sending an identical message to a particular address

10. Forgery

  • Forging of Counterfeit currency notes ,postage & revenue stamps, mark sheets etc
  • Impersonate another person

11. IPR Violations

  • Software piracy
  • Copyright infringement
  • Trademark violations
  • Theft of computer source code
  • Patent violations etc

12. Cyber Terrorism

  • Targeted attacks on

–Military installations

–Power plants

–Air traffic control

–Banks

–Rail traffic control

–Telecommunication networks

–Police

–Medical

–Fire & rescue systems etc

  • Can be conducted remotely

13.  Cyber Stalking

  • Following a person’s movements across the internet
  • By posting messages on the boards frequented by the victim
  • Entering the chat rooms frequented by the victim
  • Constantly bombarding emails to the victim
  • Section 72 of IT act is used for regulating

14. Identity Theft

  • Some one appropriates another’s personal information with out their knowledge
  • To commit theft or fraud

15. Cyber Extortion

  • Attack or threat of attack demanding money to stop the attack
  • When hackers threatens or attacks a server , a website or a computer system using DOS attack : the system is under cyber extortion

16. Cyber Warfare

  • Actions by a nation to penetrate another nation’s computers or networks
  • For causing damage or disruption
  • Can be cyber espionage
  • Obtain secrets critical to a nation’s security
  • Disrupting transport / communication by exploting computer systems or satellite technology

17. Salami Slicing/ Salami attack

  • Anything cut in to small actions or fractions

Eg: electronic transfer of money

18. Software piracy

  • Unauthorized use & distribution of computer software

19. Cyber pornography

  • Using cyberspace to create , display, distribute, import or publish pornography or obscene materials

20. Distributed DOS

  • Denial of service (DOS)
  • Using internet to break in to computers & using them to attack a network

to watch the video lesson on this topic click on the links below.

Types of Cyber Crimes

Types of Cyber crimes part 2

download the pdf of Latest who is who in India here

you can download the pdf of all study materials here

You can watch the video lessons from here

please subscribe through mail to get more useful study materials

please share to your friends

Thank you

Bibi Mohanan

 

 

 

 

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

error: Content is protected !!