Introduction (Autosaved)-1
Introduction (Autosaved)-1
2. Cyber Bullying
A form of harassment or bullying inflicted through the use of electronic or
communication devices such as computers, mobile phones, laptops, etc.
3. Cyber Stalking
Cyberstalking is the use of electronic communication by a person to follow a
person, or attempts to contact a person to foster personal interaction repeatedly
despite a clear indication of disinterest by such person; or monitors the internet,
email or any other form of electronic communication commits the offence of
stalking.
4. Cyber Grooming
Cyber Grooming is when a person builds an online relationship with a young
person and tricks or pressures him/ her into doing a sexual act.
5. Online Job Fraud
Online Job Fraud is an attempt to defraud people who are in need of
employment by giving them false hope/ promise of better employment with higher
wages.
6. Online Sextortion
Online Sextortion occurs when someone threatens to distribute private and
sensitive material using an electronic medium if he/ she doesn‟t provide images of
a sexual nature, sexual favours, or money.
7. Phishing
Phishing is a type of fraud that involves stealing personal information such
as Customer ID, IPIN, Credit/Debit Card number, Card expiry date, CVV number,
etc. through emails that appear to be from a legitimate source.
8. Vishing
Vishing is an attempt where fraudsters try to seek personal information like
Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date, CVV etc.
through a phone call.
9. Smishing
Smishing is a type of fraud that uses mobile phone text messages to lure
victims into calling back on a fraudulent phone number, visiting fraudulent
websites or downloading malicious content via phone or web.
10. Sexting
Sexting is an act of sending sexually explicit digital images, videos, text
messages, or emails, usually by cell phone.
14. Spamming
Spamming occurs when someone receives an unsolicited commercial
message sent via email, SMS, MMS and any other similar electronic messaging
media. They may try to persuade the recipient to buy a product or service, or visit a
website where he can make purchases, or they may attempt to trick him/ her into
divulging bank account or credit card details.
15. Ransomware
Ransomware is a type of computer malware that encrypts the files, storage
media on communication devices like desktops, Laptops, Mobile phones etc.,
holding data/information as a hostage. The victim is asked to pay the demanded
ransom to get his device decrypts
Worms are malicious programs that make copies of themselves again and
again on the local drive, network shares, etc.
20. Cyber-Squatting
Cyber-Squatting is an act of registering, trafficking in or using a domain
name with an intent to profit from the goodwill of a trademark belonging to
someone else.
21. Pharming
Pharming is a cyber-attack aiming to redirect a website‟s traffic to another,
bogus website.
22. Cryptojacking
Cryptojacking is the unauthorized use of computing resources to mine
cryptocurrencies.
23. Online Drug Trafficking
Online Drug Trafficking is a crime of selling, transporting, or illegally
importing unlawful controlled substances, such as heroin, cocaine, marijuana, or
other illegal drugs using electronic means.
24. Spy
Spy is the act or practice of obtaining data and information without the
permission and knowledge of the owner.
Understanding Cyber Crime
Cyber crime refers to illegal activities conducted via the internet or through
the use of information technology. It encompasses a wide range of offences
including hacking, data theft, online fraud, cyber terrorism and identity theft. The
anonymity provided by the digital space allows cyber criminals to operate with a
degree of impunity, making cyber crime an appealing avenue for illicit activities.
Nature of Cyber Crime in India
The nature of cyber crime in India is multifaceted and constantly evolving.
The most common forms of cyber crime in the country include:
Phishing: Fraudulent attempts to obtain sensitive information such as usernames,
passwords and credit card details by disguising as a trustworthy entity in an
electronic communication.
Ransomware: A type of malicious software designed to block access to a
computer system until a sum of money is paid.
Data Breaches: Unauthorised access and theft of personal or corporate data.
Online Scams: Various schemes that deceive users into paying money for
fraudulent services or goods.
Cyber Stalking and Harassment: Using the internet to stalk or harass an
individual, group or organisation.
Identity Theft: Stealing personal information to impersonate someone else for
financial gain or other benefits.
Cyber Crime against individuals: ordinary individuals are the most vulnerable
targets of cybercriminals. This is due to various reasons like lack of information,
guidance, and cyber-security.
A spoofed email is one in which e-mail header is forged so that mail appears
to originate from one sour
Spamming : Spamming means sending multiple copies of unsolicited mails or
mass e-mails such as chain letters.
This occurs when defamation takes place with the help of computers and / or
the Internet. E.g. someone publishes defamatory matter about someone on a
website or sends e-mails containing defamatory information.
Cyber Stalking Means following the moves of an individual‟s activity over
internet. It can be done with the help of many protocols available such at e- mail,
chat rooms, user net groups.
Cyber crime against Property: These type of crimes include unauthorized
computer trespassing through cyberspace, computer vandalism, transmission of
harmful programs, and unauthorized possession of computerized information.
requests so as to denying legitimate users to use the server or to crash the server.
program that can infect other computer programs by modifying them in such a way
as to include a (possibly evolved) copy of it. Viruses can be file infecting or
affecting boot sector of the computer. Worms, unlike viruses do not need the host
to attach themselves to.
designated event occurs, it crashes the computer, release a virus or any other
harmful possibilities.
before it is processed by a computer and then changing it back after the processing
is completed.
can be forged
using computers and high quality scanners and printers.
others.
another, even they change the content of website for fulfilling political objective or
for money.