Cyber crimes also include criminal activities done with the use of computers which further perpetuates crimes. i.e. financial crimes, sale of illegal articles, pornography, online gambling, intellectual property crime, e-mail, spoofing, forgery, cyber defamation, cyber stalking, unauthorized access to Computer system, theft of information contained in the electronic form, e-mail bombing, physically damaging the computer system etc.
Classifications of Cyber Crimes:
Cyber crimes can be classified under different categories which are as follows:
Cyber Crimes against Persons:
There are certain offenses which affect the personality of individuals can be defined as:- E-Mail Spoofing
Email seems to have been come from one source but actually it was coming from another source. - E-Mail Spamming
Process of sending e-mails to thousands of users without any purpose is called e-mail spamming. - Hacking:
The process of accessing information without permission via legally or illegally called Hacking. Such professionals are called Hackers
Web Hijacking: Browser Hijacking refers to a piece of software that is installed on your computer and that overrides the default functionality of your web browser. It does this without your permission and tends to be very difficult to remove.
Types of Hackers
White hackers: A "White hat" hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker.
Black hackers:
A "Black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain". Black hat hackers break into secure networks to destroy, modify, or steal data; or to make the network unusable for those who are authorized to use the network. Black hat hackers are also referred to as the "crackers"
Grey hackers:
A grey hat hacker lies between a black hat and a white hat hacker. Grey hat hackers may not necessarily perform hacking for their personal gain, unauthorized access to a system can be considered illegal and unethical. Professional expertise in hacking called Sneakers. Group of such professionals are called “Tigers”.
Blue hackers
A blue hat hacker is someone outside computer security consulting films who is used to bug-test a system prior to its launch, looking for exploits so they can be closed.
Elite hackers
A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits circulate among these hackers. - Cyber-Stalking
It means expressed or implied a physical threat that creates fear through the use to computer technology such as internet, e-mail, phones, text messages, webcam, websites or videos. - Cheating & Fraud:
It means the person who is doing the act of cyber crime i.e. stealing password and data storage has done it with having guilty mind which leads to fraud and cheating. - Child Pornography:
It involves the use of computer networks to create, distribute, or access materials that sexually exploit underage children. - Carding:
It means false ATM cards. There is always unauthorized use of ATM cards in this type of cyber crimes.
No comments:
Post a Comment