Professional Documents
Culture Documents
PART II
Page 1 of 4
Cyber Crime: It is defined as a crime in which a computer is the object. Any criminal act that is
facilitated by the use of electronic gadgets such as computer, smartphone, laptop etc. through the
internet is referred as cybercrime . Cyber Crime may be referred to as computer crime.
i) Crimes that target computer networks or devices: These types of crimes include
viruses and denial of Service attacks.
ii) Crimes that use Computer Networks to advance other criminal activities. These Types
of crimes include cyberstalking, phishing and fraud or identity theft.
Phishing: It is the practice of attempting to acquire sensitive information from individuals over
the internet by means of deception. Information typically targeted by phishing schemes include
passwords, usernames, bank account information and social security numbers.
Illegal Downloads: Illegal downloading refers to obtaining files for which you don’t have right
to use or download from the Internet. It is downloading a paid digital item without making any
payment and using an illegal way to download it.
Scams: Any fraudulent business practice that extracts money from an unsuspecting ignorant
person is called a scam. Scams traditionally resided in confidence tricks where an individual
would misrepresent themselves as someone with skill or authority ie a doctor, lawyer, investor.
Scans committed over internet are called online scams.
Page 2 of 4
INFORMATION TECHNOLOGY ACT 2000 & INDIAN PENAL CODE 1860
PROVIDES PROTECTION FROM CHILD PRONOGRAPHY.
Identity Theft: This entails the use of another person’s personal information without appropriate
consent for the purpose of fraudulent practices. Online Identity theft refers to an act of stealing
someone else’s personal information such as name, login details etc. and then posing as person
online. It is the theft of personal information in order to commit fraud or crimes.
Eg. Someone uses another person’s credit card number, Aadhaar number etc.
Online Identity theft is carried out through
1) Phishing via your email account
2) Staling your online purchase information
Page 3 of 4
Auction Fraud: In Auction Fraud people are encouraged to participate in online auction and when
money has been paid for specific items the fraudster would send either a lower standard item or a
counterfeit.
Hacking: Hacking is an attempt to exploit a computer system or a private network inside a
computer. Simply put, it is the unauthorized access to or control over computer network security
systems for some illicit purpose.
Classification Of Hackers
Hackers are mainly classified into three. They are
i) White Hat Hackers :White Hat hackers are also known as Ethical Hackers. They never
intent to harm a system, rather they try to find out weaknesses in a computer or a network
system as a part of penetration testing and vulnerability assessments. This is not illegal.
ii) Black Hat Hackers : Black Hat hackers, also known as crackers, are those who hack in order
to gain unauthorized access to a system and harm its operations or steal sensitive information.
iii) Grey Hat Hackers: Grey hat hackers are a blend of both black hat and white hat hackers.
They act without malicious intent but for their fun, they exploit a security weakness in a
computer system or network without the owner’s permission or knowledge.
Cyberbullying: Cyberbullying is bullying that takes place over digital devices like cell phones,
computers, and tablets. Cyberbullying can occur through SMS, Text, and apps, or online in social
media, forums, or gaming where people can view, participate in, or share content. Cyberbullying
includes sending, posting, or sharing negative, harmful, false, or mean content about someone else.
Instant Message (via devices, email provider services, apps, and social media messaging
features)
Page 4 of 4