Cyber Crime and Types
Cyber Crime and Types
DEFINITION OF CYBERCRIME
2
COMPARE TRADITIONAL CRIME AND CYBER CRIME
5. Victims come to know about their Victims come to know about their
losses immediately losses long after the actual commission of crimes
after the actual commission of
crimes
3
We can categorize Cyber crimes in two ways
• The Computer as a Target :- using a computer to attack other computers. e.g. Hacking, Virus/Worm
attacks, DOS attack etc.
• The Computer as a Weapon :- using a computer to commit real world crimes. e.g. Cyber Terrorism,
IPR violations, Credit card frauds, EFT frauds, Pornography etc.
• Types of Cybercrime
• Cybercrime against individual
• Cybercrime against property
• Cybercrime against organization
• Cybercrime against society
• Crimes originating from Usenet newsgroup
Cybercrime against individual
• Email Spoofing
A spoofed email is one in which e-mail header is forged so that mail appears to
originate from one source but actually has been sent from another source.
Email spoofing is the creation of email messages with a forged sender address
• Spamming
Spamming means sending multiple copies of unsolicited mails or mass e-mails such as
chain letters.
In context of “search engine spamming”, spamming is alternation or creation of a
document with the intent to deceive an electronic catalog or filing system
◗ Cyber Defamation
This occurs when defamation takes place with the help of computers and
/ or the Internet.
E.g. someonepublishes defamatory matter about someone on a website
or sends emails containing defamatory information.
◗ Harassment & Cyber Stalking
Cyber Stalking Means following the moves of an individual's activity over
internet.
It can be done with the help of many protocols available such at e- mail,
chat rooms, user net groups.
◗ Phishing
A deception designed link to steal valuable personal data, such as credit
card numbers, passwords, account data, or other information.
Phishing is the fraudulent attempt to obtain sensitive information (such as
usernames, passwords, and credit card details) by masking as a
trustworthy entity.
For example : please reset your facebook password www.facebook.com
Cybercrime against property
◗ Email Bombing
Sending large numbers of mails to the individual or company or mail
servers thereby ultimately resulting into crashing.
◗ Salami Attack
Cybercrime against organization
◗ Logic Bomb
It is an event dependent program, as soon as the designated event
occurs, it crashes the computer, release a virus or any other harmful
possibilities.
◗ Trojan Horse
An unauthorized program which functions from inside what seems to be an
authorized program, thereby concealing what it is actually doing.
◗ Data diddling
This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed
Cybercrimes against society
◗ Forgery
Currency notes, revenue stamps, mark sheets etc can be forged
using computers and high quality scanners and printers.
◗ Cyber Terrorism
Using computer resources to threaten or force others.
◗ Web Jacking
Hackers gain access and control over the website of another, even they change the content of website for fulfilling political objective or for money
Cyber Law
• Cyber Law is a framework created to give legal recognition to all risks arising out of
the usage of computers, computer network or related technology.
• “Cyber Law” is a term used to describe the legal issues related to use of Computer
and Communications Technology.
• The Indian Parliament passed the Information Technology Bill on 17th May 2000,
known as the
• ITA 2000, aimed at providing legal infrastructure for E-Commerce in India.